Entries |
Document | Title | Date |
20100076932 | IMAGE LEVEL COPY OR RESTORE, SUCH AS IMAGE LEVEL RESTORE WITHOUT KNOWLEDGE OF DATA OBJECT METADATA - A system and method for performing an image level restore of data is described. In some examples, the system receives a request to restore a file and transmits the request to an intermediate component. The intermediate component may then retrieve a directory file from an image of a secondary copy of a data set, identify a location of the file from the directory file, and provide the location to the requestor. | 03-25-2010 |
20100082542 | COMPARISON OF ONLINE ADVERTISING DATA CONSISTENCY - The subject matter disclosed herein relates to initiating a comparison of a source snapshot including current source advertising data with a destination snapshot including current destination advertising data taken at the same logical time as such a source snapshot. | 04-01-2010 |
20100153340 | Method and System for Managing Changes in Organizational Data in Unified Messaging Systems - A method and system for automatically managing changes to organizational data in a unified messaging (UM) platform are disclosed. A database snapshot is retrieved from a client human resources database. The database snapshot includes human resources information organized in an organizational hierarchy. A change is detected in the database snapshot from a previous database snapshot, and organizational data in the UM platform is automatically modified to reflect the detected change in the database snapshot. When the change is detected in the database snapshot, it is possible for the UM platform to automatically compose and send a message to at least one user associated with the change including potential modifications of the organization data. The organizational data in the UM platform can then be modified only in response to receiving approval of the potential modifications of the organizational data from at least one user associated with the change. | 06-17-2010 |
20100161558 | COMPUTER-BASED DATA PROCESSING SYSTEM AND METHOD OF PROCESSING DATA OBJECTS - A computer-based system creates a data object by preparing a data structure for the data object in a database and processes the data object at different processing stages each associating a different workflow state with the data object. The system can take and store automatically a snapshot of the data object, prior to a workflow transition of the data object from a first workflow state to a second workflow state, respectively associated with the snapshot and with the data object. The system also creates a unique locating reference for the snapshot based on a unique locating reference created previously for the data object. When the unique locating reference for the data object is received, controlled access to the data object and the snapshot is provided. Based on one unique locating reference, multiple states of the data object can be easily and efficiently made available concurrently to a user. | 06-24-2010 |
20100250493 | USING A SPARSE FILE AS A CLONE OF A FILE - One embodiment is for using a sparse file as a clone. The method includes creating, by an application associated with a computer system, a snapshot of a file, such as an individual file, a collection of files, file system, directories, and so forth. Further, the method includes requesting, by the application, a clone of that created snapshot. Further still, the method includes generating, by the application, an empty sparse having at least one inode identifying the empty sparse file as the clone and pointing to the snapshot associated with the clone. Thereby, the requested clone is created using the created sparse file, which begins as an empty sparse file. | 09-30-2010 |
20110022566 | FILE SYSTEM - A digitally signed file system in which data, metadata and files are objects, each object having a globally unique and content-derived fingerprint and wherein object references are mapped by the fingerprints; the file system has a root object comprising a mapping of all object fingerprints in the file system, such that a change to the file system results in a change in the root object, and tracking changes in the root object provides a history of file system activity. | 01-27-2011 |
20110022567 | METHOD AND APPARATUS FOR ROUTING DATA IN AN AUTOMATIC IDENTIFICATION SYSTEM - A system for routing data in an automatic identification system includes an event management system (EMS), a real-time in-memory data structure (RIED) coupled to the EMS, the RIED for storing event information gathered by the EMS and a task management system (TMS) for ensuring that the RIED is updated by one transaction at a time. With this particular arrangement, a system for managing a large number of real-time events is provided. In one embodiment, the control system can be provided in a distributed hierarchical arrangement. The EMS of each control system can include filters which limit the amount of information provided to the next level in the hierarchy. In this manner the hierarchical control system network acts as a high volume data collector and processor. In some embodiments a level of the hierarchy can be removed spatially and/or temporally from an adjacent level in the hierarchy. This approach results in an intelligent network and also lends itself to scalability. By including optional filters and queues in the EMS, the EMS can be configured as desired. | 01-27-2011 |
20110066596 | APPARATUS AND METHOD FOR REPLICATING DATA IN FILE SYSTEM - A data replication system comprises a NAS controller and a storage system. In a first embodiment, after a NAS system takes a snapshot of a volume, the NAS system changes the referral information within the volume. Also, as an additional way to ensure the consistency after taking a snapshot, the NAS System returns the changed referral information based on a referral management table when clients access a referral within the snapshot volume so that clients can access an appropriate volume. In a second embodiment, after a volume on a NAS system is replicated by remote copy to a remotely deployed NAS system, the remotely deployed NAS system returns the changed referral information based on a referral management table when clients access a referral within the replicated volume so that clients can access an appropriate volume. | 03-17-2011 |
20110078115 | METHODS OF CONSISTENT DATA PROTECTION FOR MULTI-SERVER APPLICATIONS - A system according to one embodiment includes at least one processor configured to: receive a request to perform a snapshot of data associated with an application running on multiple servers; instruct I/O Freezers on different servers to freeze data requests from instances of the application running on the servers; and instruct the I/O Freezers to initiate snapshot processing on the data associated with the application so that the I/O Freezers perform the snapshot processing within the same window of synchronization. | 03-31-2011 |
20110093435 | Virtual Database System - Information from multiple databases is retrieved and stored on a database storage system. Multiple point-in-time copies are obtained for each database. A point-in-time copy retrieves data changed in the database since the retrieval of a previous point-in-time copy. A virtual database (VDB) is created by creating a set of files in the data storage system. Each file in the set of files created for a VDB is linked to the database blocks on the database storage system associated with a point-in-time copy of the source database. The set of files associated with the VDB are mounted on a database server allowing the database server to read from and write to the set of files. Workflows based on VDBs allow various usage scenarios based on databases to be implemented efficiently, for example, testing and development, backup and recovery, and data warehouse building. | 04-21-2011 |
20110093436 | Datacenter Workflow Automation Scenarios using Virtual Databases - Information from multiple databases is retrieved and stored on a database storage system. Multiple point-in-time copies are obtained for each database. A point-in-time copy retrieves data changed in the database since the retrieval of a previous point-in-time copy. A virtual database (VDB) is created by creating a set of files in the data storage system. Each file in the set of files created for a VDB is linked to the database blocks on the database storage system associated with a point-in-time copy of the source database. The set of files associated with the VDB are mounted on a database server allowing the database server to read from and write to the set of files. Workflows based on VDBs allow various usage scenarios based on databases to be implemented efficiently, for example, testing and development, backup and recovery, and data warehouse building. | 04-21-2011 |
20110099147 | PROVISIONING AND MANAGING REPLICATED DATA INSTANCES - A replicated database instance can be provisioned that provides primary and secondary replicas that can be provisioned in different data zones or geographical locations. The database can be installed on the primary replica, and both the primary and secondary replica can have installed a block level replication mechanism that allows any I/O operation to be replicated by between the primary and secondary replicas. Any failure or outage of the primary replica can be addressed by performing a failover operation to the secondary replica. A DNS name or other such approach can be used such that the name can be aliased to the secondary replica during a failover, such that there is no action needed on the part of the customer to utilize the “new” primary replica. The creation of the database and provisioning of the replicated instance can be initiated using a Web service call to a control environment. | 04-28-2011 |
20110099148 | Verification Of Remote Copies Of Data - Synchronous mirroring of data stored in a first storage system is performed by storing a mirror copy of the data at a remote second storage system. A first snapshot of the data stored in the first storage system is created, and a second snapshot of the mirror copy in the second storage system is created. A first signature of the first snapshot and a second signature of the second snapshot are calculated, and the first and second signatures are compared to verify whether or not the data in the first storage system is identical to the mirror copy in the second storage system. | 04-28-2011 |
20110106763 | STORAGE REPLICATION SYSTEMS AND METHODS - Systems and methods for information storage replication are presented. In one embodiment a replication method includes performing an intelligent synchronization process of selected portions of a primary image and intelligent verification of the accuracy of the replication. The intelligent synchronization process can include forwarding information if the information is in use (e.g., has been altered, written to, etc.) and the intelligent verification can be performed on the information in use. | 05-05-2011 |
20110106764 | PROVIDING A SIMULATED DYNAMIC IMAGE OF A FILE SYSTEM - Embodiments described herein adapt static-image and clone technology to provide a simulated dynamic image to an application requesting a dynamic image. A storage system is configured to backup its file system by taking a first static image of the file system at a point in time. A clone of the first image may then be produced, the clone containing any subsequent changes to the file system and a reference pointer to the first image. A second static image of the clone is then produced. An application may request, from the storage system, an image of the file system. In response, the second static image may be presented to the application as a simulated dynamic image. | 05-05-2011 |
20110119234 | SYSTEMS AND METHODS FOR ADAPTIVE COPY ON WRITE - In one embodiment, a user or client device communicates with a distributed file system comprised of one or more physical nodes. The data on each of the physical nodes store metadata about files and directories within the file system. Some of the embodiments permit a user to take a snapshot of data stored on the file system. The snapshot may include a single file, a single directory, a plurality of files within a directory, a plurality of directories, a path on the file system that includes nested files and subdirectories, or more than one path on the file system that each includes nested files and directories. In some embodiments, systems and methods intelligently choose whether to use copy-on-write or point-in-time copy when saving data in a snapshot version of a file whose current version is being overwritten. In some embodiments, systems and methods allow snapshot users to return from a snapshot directory to the immediate parent directory from which the user entered into the snapshot. | 05-19-2011 |
20110131184 | FOCUSED BACKUP SCANNING - Methods, systems, and computer program products are provided for performing data backup of a file system. A monitoring process is configured to include a file system representation (FSR) representing the file system, the FSR comprising a plurality of nodes, each node corresponding to a respective one of a plurality of elements of the file system. A monitoring process includes a file system representation (FSR) of a file system. The FSR comprises a plurality of nodes corresponding to a respective one of a plurality of elements of the file system. The monitoring process receives a notification of a change to a first element of the file system, caches information associated with a second element of the file system to provide cached information, and processes the FSR in response to the change. | 06-02-2011 |
20110137863 | STORAGE SYSTEM, NAS SERVER AND SNAPSHOT ACQUISITION METHOD - A storage system including: a storage device for storing a file; a plurality of file systems for managing the file; and a plurality of NAS servers that control access from a client to the file systems via a global namespace formed by grouping local namespaces for the one or more file systems; wherein, each NAS server includes a memory to store global namespace management information including global paths of the file systems; one NAS server of the NAS servers accepts a request to obtain snapshots of the file systems from external of the storage system; the one NAS server instructs itself and the other NAS servers to obtain snapshots of the file systems; the one NAS server and the other NAS servers obtain the snapshots of the file systems, and inform the one NAS server of snapshot identifiers and of local paths of the snapshots; the one NAS server makes snapshot management information including global paths of the snapshots based on each of the snapshot identifiers received from the other NAS servers and each of the global paths of file systems corresponding to the snapshots, included in the namespace management information so that both the global paths of the file systems and the global paths of the snapshots are configured on the same global namespace simultaneously, with a directory configuration of the snapshots being same in configuration layout as a directory configuration of the file systems; and the one NAS server informs the other NAS servers of the snapshot management information. | 06-09-2011 |
20110161295 | SYSTEMS AND METHODS FOR ANALYZING SNAPSHOTS - This application describes techniques for creating a second snapshot of a first snapshot of a set of data, modifying the first snapshot, and reverting the modifications to the first snapshot. For example, portions of one or more transaction logs may be played into a database to put the database in a particular state a particular point in time. The second snapshot may then be used to revert to a prior state of the database such that additional transaction logs may be played into the database. These techniques enable the ability to put the database into multiple states as the database existed at multiple points in time. Therefore, data can be recovered from the database as the data existed at different points in time. Moreover, individual data objects in the database can be accessed and analyzed as the individual data objects existed at different points in time. | 06-30-2011 |
20110184912 | DISPERSED STORAGE NETWORK UTILIZING REVISION SNAPSHOTS - A method begins by a processing module obtaining a directory file and determining a new snapshot identifier (ID) for the directory file. The method continues with the processing module identifying a version of a filename to associate with the new snapshot ID and updating the directory file by associating the snapshot ID to the version of the filename to produce an updated directory file. The method continues with the processing module dispersed storage error encoding the updated directory file to produce a set of encoded updated directory file slices and sending the set of encoded updated directory file slices to a dispersed storage network (DSN) memory for storage. | 07-28-2011 |
20110191295 | MOUNTING APPLICATIONS ON A PARTIALLY REPLICATED SNAPSHOT VOLUME - A partial replication step shot method. The method includes receiving a first snapshot at a first time from a replication source and receiving a set of data objects from the replication source that have been modified during a time period between the first time and a subsequent second time. A second snapshot is generated at the second time on the replication source by using the set of data objects. An application is mounted onto the second snapshot prior to the set of data objects being received to completion. | 08-04-2011 |
20110191296 | Systems And Methods For Providing Business Continuity Services - Systems and methods for providing business continuity services after a disaster or other loss of data are provided. The system and methods include accessing, replicating, and storing customer data. In the event of a disaster or other loss of data, the stored data is used to create fully recovered systems. The systems and methods provide for a remote data center that offers protection against physical disasters. The systems and methods include providing a virtual recovered operating system environment identical to the source operating system environment in less than 8 hours after notification of a disaster. | 08-04-2011 |
20110191297 | Clustered filesystem with data volume snapshot maintenance - A computer system with read/write access to storage devices creates a snapshot of a data volume at a point in time while continuing to accept access requests to the mirrored data volume by copying before making changes to the base data volume. Multiple snapshots may be made of the same data volume at different points in time. Only data that is not stored in a previous snapshot volume or in the base data volume are stored in the most recent snapshot volume. | 08-04-2011 |
20110225124 | CREATING A BUFFER POINT-IN-TIME COPY RELATIONSHIP FOR A POINT-IN-TIME COPY FUNCTION EXECUTED TO CREATE A POINT-IN-TIME COPY RELATIONSHIP - Provided are a method, system, and computer program product for creating a buffer point-in-time copy relationship for a point-in-time copy function executed to create a point-in-time copy relationship. A point-in-time copy function is initiated to create a new point-in-time copy relationship from a source volume comprising a first volume to a target volume comprising a second volume. Detection is made that the target volume of the new point-in-time copy relationship is a source volume of a first pre-existing point-in-time copy relationship having as a target volume a third volume. Detection is also made that the target volume of the first pre-existing point-in-time copy relationship is a source volume of a second pre-existing point-in-time copy relationship having as a target volume a fourth volume. A buffer point-in-time copy relationship having a source volume comprising the target volume of the first pre-existing relationship and a target volume comprising a fifth volume is created in response to detecting that the target volume of the new point-in-time copy relationship is the source volume of the first pre-existing point-in-time copy relationship and the detected that the target volume of the first pre-existing point-in-time copy relationship is the source volume of the second pre-existing point-in-time copy relationship. | 09-15-2011 |
20110246423 | METHOD FOR IMPLEMENTING MULTI-ARRAY CONSISTENCY GROUPS USING A WRITE QUEUING MECHANISM - A method for implementing multi-array consistency groups includes applying a write Input/Output (I/O) queue interval to a Logical Unit (LU) member of a consistency group (CG). The method also includes marking each write I/O with a timestamp and suspending I/O from the participating storage array to the LU member of the CG upon the participating storage array receiving a snapshot request from a master storage array. The method further includes determining whether the snapshot request timestamp is within the write I/O queue interval of the participating storage array. | 10-06-2011 |
20110270803 | Cloud Commands - An apparatus and a method for delegating commands for a network attached storage system is described. A command permission associated with a command to be executed on a Network Attached Storage (NAS) server is delegated to a user of a NAS client having a mounted network filesystem of the NAS server. The command is issued through the filesystem of the NAS client. | 11-03-2011 |
20120005162 | Managing Copies of Data Structures in File Systems - A method, data processing system, and computer program product for managing data. A processor unit copies a data structure within a hierarchy of data structures to form a copy of the data structure. The data structure belongs to a level within a plurality of levels in the hierarchy of data structures. The processor unit associates an identifier with the data structure within the hierarchy of data structures. The processor unit increments a portion of the identifier for the data structure in response to copying the data structure to form the copy of the data structure and associating the identifier with the data structure within the hierarchy of data structures. The portion of the identifier that is incremented is based on the level within the plurality of levels in which the data structure is located. | 01-05-2012 |
20120023068 | METHODS OF MULTI-SERVER APPLICATION SYNCHRONIZATION WITHOUT STOPPING I/O - A method according to one embodiment includes receiving a request to perform a backup of data associated with an application running on multiple servers; communicating with I/O Handlers on the servers for initiating a coordinated backup operation on the data at about a same start time; and instructing the I/O Handlers to stretch communication between instances of the application and data storage volumes associated therewith during initiating the backup operation. Additional systems, methods, and computer program products are also disclosed. | 01-26-2012 |
20120030174 | DISTRIBUTED SNAPSHOT PROCESS - Systems and methods for providing an efficient partitioned resource server are disclosed. The partitioned resource server includes a plurality of individual servers, and the individual servers support a storage service. The systems and methods provide archiving processes for partitioned resources. To this end, the systems and process include a snapshot process operating on a server and capable of coordinating with other snapshot processes operating on the other servers for generating state information representative of the state of the partitioned resources. | 02-02-2012 |
20120047108 | POINT-IN-TIME (PIT) BASED THIN RECLAMATION SUPPORT FOR SYSTEMS WITH A STORAGE USAGE MAP API - A method, a system and/or and an apparatus to minimize data loss by de-allocating storage space with the help of an Application Programming Interface (API). In one embodiment, the method includes reclaiming data storage in a storage device slated as a reclamation target by redirecting write commands intended for the reclamation target to a point-in-time volume of the reclamation target; generating a list of portions of storage from the reclamation target such that each portion of storage has an API state of unused as per a system that uses the storage device; and includes converting a reclamation state associated with each of the portions of storage to a state of ‘unused’. In addition, the method involves synchronization of the point-in-time volume with the reclamation target to capture any changes that might be associated with the point-in-time volume. | 02-23-2012 |
20120066181 | FILE REMOVAL WITH NO AVAILABLE DISK BLOCKS IN REDIRECT-ON-WRITE FILE SYSTEMS - Embodiments include a method for removing a file within a redirect-on-write file system. In some embodiments, a file removal operation is detected in a file management unit, which resides in a memory unit. It is then determined that the number of free data blocks in the persistent storage is below a minimum threshold. The file removal operation is written to a log used for storing system operations. A file management unit is notified of the successful write of the file removal operation to the log used for storing system operations. The data blocks are moved from the file selected for removal to a list of free data blocks. The indirect blocks from the file selected for removal are moved to a data block removal list. | 03-15-2012 |
20120066182 | INODE MANAGEMENT IN REDIRECT-ON-WRITE FILE SYSTEM - Some embodiments of the inventive subject matter allow a redirect-on-write file system to continue processing file transactions while writing a snapshot to persistent storage. Thus, embodiments do not block file transactions while flushing snapshots to persistent storage. To avoid blocking, some embodiments the file system can maintain two snapshot generations. The first snapshot generation is the snapshot being written to persistent storage. The second snapshot generation may reside in main memory, and store data for file transactions occurring after the file system began writing the first snapshot generation. | 03-15-2012 |
20120089569 | Versioned file system with sharing - A method of data sharing among multiple entities is provided. Each entity exports to a data store a structured data representation comprising a versioned file system local to that entity. The method begins by forming a sharing group that includes two or more entities. Sharing of the structured data representations by members of the sharing group is enabled. The filers use a single distributed lock to protect each version of the file system. This lock is managed to allow each filer access to the shared file system volume to create its new version. To share a fully-versioned file system, asynchronous updates at each of the filers is permitted, and each node is then allowed to “push” its individual changes to the store to form the next version of the file system. A mechanism also may be used to reduce the period during which filers in the group operate under lock. | 04-12-2012 |
20120089570 | Virtual Database System - Information from multiple databases is retrieved and stored on a database storage system. Multiple point-in-time copies are obtained for each database. A point-in-time copy retrieves data changed in the database since the retrieval of a previous point-in-time copy. A virtual database (VDB) is created by creating a set of files in the data storage system. Each file in the set of files created for a VDB is linked to the database blocks on the database storage system associated with a point-in-time copy of the source database. The set of files associated with the VDB are mounted on a database server allowing the database server to read from and write to the set of files. Workflows based on VDBs allow various usage scenarios based on databases to be implemented efficiently, for example, testing and development, backup and recovery, and data warehouse building. | 04-12-2012 |
20120089571 | COMPUTER PROCESS MANAGEMENT - A computer implemented process is defined to operate on three types of objects: Task Objects, Resume Objects, and State Objects. To define a Task Objects are implemented to perform the actions required to complete a particular aspect of the process. A State Object maintains information about the currently executing process, such as the values of variables and the current location in the executing process. A Resume Object directs process execution by specifying which Task Objects or Resume Objects to execute next. A key aspect of the system is the ability to suspend execution at any time and seamlessly resume execution at either the exact point execution was stopped or at any execution point prior to suspension. This accomplished by periodically storing Snapshots of the execution to persistent storage, which can later be used to restore the state of the system to that of the Snapshot. | 04-12-2012 |
20120095965 | SYNCHRONIZATION FOR INITIALIZATION OF A REMOTE MIRROR STORAGE FACILITY - A method includes computing, in a local storage system having a local volume with a plurality of local regions, respective local signatures over the local regions, and computing, in a remote storage system having a remote volume with remote regions in a one-to-one correspondence with the local regions, respective remote signatures over the remote regions. A given remote region is identified, the given remote region having a given remote signature and a corresponding local region with a given local signature that does not match the given remote signature. The data in the given remote region is then replaced with data from the corresponding local region. | 04-19-2012 |
20120143821 | SYSTEM AND METHOD FOR TRACKING CONFIGURATION CHANGES IN ENTERPRISE PRODUCT - In one embodiment, an automatic, remote and centralized configuration management system for tracking configuration changes in an enterprise product is provided. The system comprises at least one subsystem forming a part of the enterprise product, an agent coupled to the subsystem, the agent configured for creating one or more configuration snapshots of the subsystem and a configuration manager operably coupled to the agent, the configuration manager configured to communicate with the agent to collect the one or more configuration snapshots so as to track the configuration changes in the enterprise product. | 06-07-2012 |
20120143822 | STORAGE SYSTEM, NAS SERVER AND SNAPSHOT ACQUISITION METHOD - A storage where one NAS server makes snapshot management information including global paths of snapshots based on snapshot identifiers and global paths of file systems corresponding to the snapshots, so that global paths of both the file systems and snapshots are configured on the same global namespace simultaneously, with a directory configuration of the snapshots being the same in configuration layout as a directory configuration of the file systems; the one NAS server informs other NAS servers of the snapshot management information; memory in each of the NAS servers stores the snapshot management information; the snapshot management information includes the snapshot identifier, local path and global path for each of snapshots obtained by each NAS server at each point in time; and the computer obtains the snapshot management information from at least one of the NAS servers and displays at least a part of the snapshot management information. | 06-07-2012 |
20120150804 | MULTIPLE CONTEXTS IN A REDIRECT ON WRITE FILE SYSTEM - A method includes initiating committing to persistent storage of a current consistency snapshot of a plurality of data objects in a redirect-on-write file system. Each of the plurality of data objects has a first copy of at least two copies of the data having a first context of at least two contexts. The method includes receiving, during committing to storage of the current consistency snapshot, an update to a data object of the plurality of data objects. The method also includes responsive to receipt of the update to the data object, creating a second copy of data of the data object from the first copy. The second copy of the data has a second context of the at least two contexts. The method includes responsive to receipt of the update to the data object, updating, based on the update, the second copy of the data of the data object. | 06-14-2012 |
20120158659 | HOST BASED SOFTWARE BLOCK LEVEL REPLICATION USING METADATA INDICATING CHANGED DATA OBJECTS AT SOURCE AND SECONDARY NODES - A host-based replication snapshot method. The method includes synchronizing a set of data objects stored at both a replication source node and a secondary node. The method further includes identifying changed data objects out of the set of data objects from the replication source node that have been modified during a time period between a first time and a subsequent second time. Metadata indicating the changed data objects from the replication source node is transmitted to the secondary node. A snapshot is then generated at the second time on the secondary node by using the metadata. | 06-21-2012 |
20120173488 | TENANT-SEPARATED DATA STORAGE FOR LIFECYCLE MANAGEMENT IN A MULTI-TENANCY ENVIRONMENT - A system, method and computer program product for tenant separated data storage for lifecycle management in a multi-tenancy environment is presented. A plurality of data containers is defined in a storage subsystem, each data container comprising a main data storage and a file system data storage for receiving, respectively, main data and file system data, each of the plurality of data containers being separate from all other data containers of the plurality of data containers. For each tenant of a plurality of tenants of a multi-tenancy computing system, main data is stored in the main data storage of one of the plurality of data containers and storing file system data in the file system data storage of the one of the plurality of data containers. For a transaction to be executed with a source tenant, only main data and file system data is accessed from a data container associated with the source tenant. The transaction is executed with the main data and file system data accessed from the data container associated with the source tenant. | 07-05-2012 |
20120191654 | CLUSTERED FILESYSTEM WITH DATA VOLUME SNAPSHOT MAINTENANCE - A computer system with read/write access to storage devices creates a snapshot of a data volume at a point in time while continuing to accept access requests to the mirrored data volume by copying before making changes to the base data volume. Multiple snapshots may be made of the same data volume at different points in time. Only data that is not stored in a previous snapshot volume or in the base data volume are stored in the most recent snapshot volume. | 07-26-2012 |
20120197842 | Space Efficient Cascading Point in Time Copying - A computer implemented method for a space efficient cascading point-in-time copying of source data by creating a plurality of cascading point-in-time target copies, the target copies being created at different points in time. The method includes physically copying data from the source data to a repository to create a physical copy, and creating a data mapping that associates the physical copy with a most recent target copy. The method may be implemented in either of computer hardware configured to perform the method and computer software embodied in a non-transitory, tangible, computer-readable storage medium. Also disclosed are a corresponding computer program product and data processing system. | 08-02-2012 |
20120203739 | Programmatic Snapshot and Revert of Virtualized Data Center Inventory - A snapshot of an inventory of a virtualized computer system is produced and a user-editable code is generated therefrom, so that the inventory can be reconstructed entirely or partially. The snapshot includes identifying data for items in the virtualized computer system, and relationship data that indicate hierarchical and non-hierarchical relationships between the items. The items in the inventory of the virtualized computer system include virtual machines, servers on which the virtual machines are running, one or more data centers in which the servers reside, and logical containers such as folders for virtual machines, resource pools that each contain one or more virtual machines, and server clusters that each contain one or more servers. | 08-09-2012 |
20120203740 | Method and System for Implementing an Enhanced Database - In one embodiment, a method for storing a snapshot of data in a database includes creating a root indirection set for the snapshot of data and maintaining a deleted pattern in the database. The deleted pattern is not removed from a pattern set for a node in a table of the database when the pattern is deleted in the database. The method includes providing access to the snapshot of data using the created root indirection set, the created root indirection set accessing the deleted pattern. | 08-09-2012 |
20120209810 | Using a Sparse File as a Clone of a File - One embodiment is for using a sparse file as a clone. The method includes creating, by an application associated with a computer system, a snapshot of a file, such as an individual file, a collection of files, file system, directories, and so forth. Further, the method includes requesting, by the application, a clone of that created snapshot. Further still, the method includes generating, by the application, an empty sparse having at least one inode identifying the empty sparse file as the clone and pointing to the snapshot associated with the clone. Thereby, the requested clone is created using the created sparse file, which begins as an empty sparse file. | 08-16-2012 |
20120233123 | SYSTEM AND METHOD FOR PROVIDING ASSURED RECOVERY AND REPLICATION - The system and method for providing assured recovery and replication described herein may recover a master data source from a replica data source without impacting the master data source or the replica data source, and without having to install a standby version of an application associated with the master data source. In particular, a master snapshot may be created to copy application data stored in the master data source, wherein a replication server confirms that the replica data source can recover the master data source if the master snapshot and the replica data source are consistent. The replication server may create a replica snapshot to copy the replica data source and assign an identity associated with the master data source to the replica data source to recover the master data source. As such, replication may be resumed on a virtual machine disk file associated with the replica snapshot. | 09-13-2012 |
20120239622 | SYNCHRONIZATION FOR INITIALIZATION OF A REMOTE MIRROR STORAGE FACILITY - A method includes computing, in a local storage system having a local volume with a plurality of local regions, respective local signatures over the local regions, and computing, in a remote storage system having a remote volume with remote regions in a one-to-one correspondence with the local regions, respective remote signatures over the remote regions. A given remote region is identified, the given remote region having a given remote signature and a corresponding local region with a given local signature that does not match the given remote signature. The data in the given remote region is then replaced with data from the corresponding local region. | 09-20-2012 |
20120254114 | METHOD AND SYSTEM FOR REPLICATING DATA - Methods, computing environments, and computer program products are provided for replicating data. Point-in-time copy parameters are generated at a primary host site. A side file entry having the point-in-time copy parameters and a track information field (TIF) associated with the point-in-time copy parameters is generated. The side file entry is transferred to a secondary host site. A point-in-time copy process is performed at the secondary host site based on the point-in-time copy parameters and the TIF. | 10-04-2012 |
20120271797 | REFERENCE VOLUME FOR INITIAL SYNCHRONIZATION OF A REPLICATED VOLUME GROUP - A method for using a reference volume for initial synchronization of a replicated volume group. The method includes initiating a replication and synchronization operation between a parent virtual machine and a child virtual machine, and specifying a parent virtual machine to be used for replication and a subsequent synchronization. The method further includes accessing a point in time snapshot of the parent virtual machine, coordinating with a secondary site to obtain an image of the parent reference volume at said point in time, and copying the common regions from a parent reference volume to a new volume. The differences between the parent reference volume and the new volume are transmitted and are applied to the new volume to synchronize the child virtual machine on the secondary site to the child virtual machine on the primary site, wherein the child and the parent may be in different virtual machine groups. | 10-25-2012 |
20120278285 | Storage Performance Optimization - A system and method for enhancing data throughput in data warehousing environments by connecting multiple servers having local storages with designated external storage systems, such as, for example, those provided by SANS. The system and method may preserve a full reference copy of the data in a protected environment (e.g., on the external storage system) that is fully available. The system and method may enhance overall I/O potential performance and reliability for efficient and reliable system resource utilization. | 11-01-2012 |
20120310888 | METHOD AND SYSTEM FOR FAST GENERATION OF FILE SYSTEM SNAPSHOT BITMAP IN VIRTUAL ENVIRONMENT - A method, system and computer program product for generation and management of incremental backups of VEE file system using bitmaps. The proposed method allows users to roll back to any previous version or state of the VEE file system and to instantiate this version using the data encapsulated in virtual disk storage (i.e. file system) of the VEE. A number of VEEs run on a Host Operating System of the computer system. One of the VEEs implemented on the computer system is designated to generation and management of backups of the virtual disk data of the other VEEs without freezing the file system during the entire backup process. A special tracing application runs on the designated VEE for generating the bitmap of a file system snapshot. The user can also set up a time for generating a backup or create a schedule for automatically generating the backups at critical points. | 12-06-2012 |
20120310889 | METHODS AND APPARATUS FOR MULTI-PHASE MULTI-SOURCE BACKUP - Methods and apparatus that identify a change of resources in a device to a first backup source are described. In response to receiving a token from the first backup source for authorization to a second backup source, the change of resources can be backed up to the second backup source with the token. The change of resources can be committed to the first backup source if the back up of the change to the second backup source is successful. | 12-06-2012 |
20120317079 | Systems and methods of data replication of a file system - The invention relates to methods for replicating a primary file system on a primary host to a secondary file system on a secondary host including determining a primary data block to replicate by reading a space map block entry (b, e) of the primary data block, wherein b represents the first snapshot and e the last snapshot to use the primary data block; computing a checksum of a primary data block and sending its number to the secondary host and determining a secondary data block that corresponds and computing its checksum then comparing the primary and secondary data block checksums and replicating the primary data block on the secondary file system when the primary and secondary checksums mismatch for the primary file system. In another aspect of the method if the primary and secondary checksums mismatch the method sends all data blocks from the primary file system allocated after a reliable snapshot on the secondary file system to the secondary host to be written on the secondary file system. | 12-13-2012 |
20130006936 | CAPTURING AN ARCHIVING SNAPSHOT - A technique includes, in a first computer system, archiving data for a plurality of environments. Each of the environments are associated with a different combination of an active data source selected from a plurality of active data sources and an archive target selected from a plurality of archive targets. The technique includes capturing a partial snapshot of the archiving, the partial snapshot is associated with one environment for the plurality of environments such that the partial snapshot may be used to replicate said archiving associated with the one environment on another computer system. | 01-03-2013 |
20130006937 | ERROR TRACKING METHOD AND SYSTEM - Data storage services are provided for clients for backup of data objects from the clients. A data object is sent to a first location in a first storage device. A determination is made if the data object was successfully stored at the first location, and if so, meta data corresponding with the data object is stored, wherein the meta data includes first path information on a first data path of the data object to the first location. The data object is migrated from the first location to a second location in a second storage device. A determination is made if the data object was successfully stored at the second location, and if so, second path information on a second data path of the data object is added to the second location to the meta data corresponding with the data object, to update the meta data. | 01-03-2013 |
20130006938 | SYSTEMS AND METHODS FOR PERFORMING DATA REPLICATION - Performing data management operations on replicated data in a computer network. Log entries are generated for data management operations of an application executing on a source system. Consistency point entries are used to indicate a time of a known good, or recoverable, state of the application. A destination system is configured to process a copy of the log and consistency point entries to replicate data in a replication volume, the replicated data being a copy of the application data on the source system. When the replicated data represents a known good state of the application, as determined by the consistency point entries, the destination system(s) may perform a storage operation (e.g., snapshot, backup) to copy the replicated data and to logically associate the copied data with a time information (e.g., time stamp) indicative of the source system time when the application was in the known good state. | 01-03-2013 |
20130006939 | SYSTEMS AND METHODS FOR RELIABLY MANAGING FILES IN A COMPUTER SYSTEM - Systems and methods allow for reliably and efficiently managing files stored on a data storage medium associated with a computer system such as a set-top box. The computer system manages a collection of metadata describing each of the files stored on the data storage medium in a memory during operation of the computer system. A current snapshot of the collection of metadata is periodically or otherwise stored to the data storage medium. Following a reboot of the computer system, the collection of metadata can be recovered to the memory from the snapshot of the collection of metadata stored on the data storage medium. | 01-03-2013 |
20130013563 | SYSTEM AND METHOD FOR PERFORMING INTEGRATED STORAGE OPERATIONS - The present invention relates to a method for performing integrated storage operations on an information store. The present invention comprises identifying a plurality disparate types of storage operations stored in a policy option table. A first storage operation is performed according to a first set of storage criteria stored in the policy option table and a second operation, disparate from the first storage operation, is performed according to a second set of storage criteria stored in the policy option table. | 01-10-2013 |
20130054529 | SHADOW COPY BOOKMARK GENERATION - Systems and methods for generating a bookmark for a snapshot of one or more volumes of a production server include initiating a snapshot process to capture a shadow copy of a snapshot-volume set, which includes one or more volumes of the production server. The snapshot process (e.g., Volume Shadow Copy Service of Windows™ operating system) may include (a) temporarily freezing operations on a file system of the production server, and (b) releasing a freeze of operations on the file system of the production server. A bookmark for the shadow copy (representing a consistent state of the associated volumes) may be generated such that the bookmark corresponds to a completion of the temporarily freezing or releasing a freeze of the operations. The bookmark may include a point in time of the completion of the temporarily freezing or releasing the freeze of the operations. | 02-28-2013 |
20130054530 | LIVE FILE SYSTEM MIGRATION - In general, the invention relates to a method for migrating a source file system residing on a source server to a destination server. The method includes sending a first snapshot of the source file system from the source server to the destination server and creating, using the first snapshot, a migrated file system on the destination server. The method further includes sequentially sending, to the destination server, a set of snapshot deltas including modifications to the source file system, updating the migrated file system using the set of snapshot deltas, determining that a freeze threshold is exceeded, freezing the source file system, sending a final snapshot delta from the source server to the destination server, updating the migrated file system using the final snapshot delta, creating a file system husk referencing the migrated file system, and thawing the source file system and the migrated file system. | 02-28-2013 |
20130080389 | ALLOCATION OF ABSENT DATA WITHIN FILESYSTEMS - Systems and methods which provide an absent allocation technique with respect to absent data of a data structure for which data migration in a time-displaced data migration operation has not completed are disclosed. Through use of absent allocated data block states of an absent allocation technique of embodiments, dependency between source and destination data stores may be broken. An absent allocated data block state of embodiments stored within the data structure provides a suggestive indication that data of a data block of a data structure is absent from the data structure. A corresponding absent allocated data block state of embodiments stored external to the data structure provides a determinative indication that the data of the data block of the data structure is absent from the data structure. The absent data block determinative indictor of embodiments is updated as data continues to be migrated. | 03-28-2013 |
20130085994 | CREATING HOST-LEVEL APPLICATION-CONSISTENT BACKUPS OF VIRTUAL MACHINES - A host server hosting one or more virtual machines can back up host volumes and the one or more virtual machines installed thereon in an application-consistent manner. In one implementation, a host-level requestor instructs a host-level writer to identify which virtual machines qualify for application-consistent backups. The host-level requestor then instructs the host-level writer to initiate virtual machine backups through guest-level requesters in each appropriately-configured virtual machine, wherein the virtual machines create application-consistent backups within the virtual machine volumes. The host-level requester then initiates snapshots of the server volumes on the host-level. The virtual machine-level snapshots can thus be retrieved from within the host-level snapshots of the server volumes. | 04-04-2013 |
20130117231 | APPLICATION PROTECTION THROUGH A COMBINED FUNCTIONALITY FAILURE MANAGER - A method for providing application functionality protection. The method includes accessing a distributed computer system having a cluster including a plurality of nodes, and receiving an indication of an application failure. The method further includes attempting to restore the application through a number of application restart attempts, and receiving an indication that the restart attempts have not restored the application. An image history is then accessed to obtain a last known good point in time image of the application. The application is restored in accordance with the last known good point in time image. | 05-09-2013 |
20130117232 | SNAPSHOTS OF DATABASE MODELS - Methods, systems, and computer program products are provided for capturing snapshots of database models. Metadata of a database model is captured. A database model snapshot object is generated based on the captured metadata. The generated database model snapshot object is transportable, extensible, secure, and human readable. Furthermore multiple database model snapshot objects may be compared to each other to determine differences in database models in different database systems, to track how a database model of a database system is changing over time, to track how database source projects evolve over time and/or for other uses. | 05-09-2013 |
20130124478 | DATA ANALYTICS REPORTING SYSTEM AND METHODS - A non-spreadsheet charting report showing dynamic data from a data feed may be designed by populating a spreadsheet template with a data snapshot of data currently collected to obtain a snapshot spreadsheet having rows and columns that map back to data fields of the data snapshot. A remote user can insert and/or modify one or more spreadsheet-chart elements to graphically depict aspects of the data snapshot. Report-presentation meta-data is then extracted from the modified spreadsheet, and a report-presentation template is generated for subsequent use. When a dynamic charting report is requested, updated data from the data feed is used to populate the report-presentation template. | 05-16-2013 |
20130132346 | METHOD OF AND SYSTEM FOR MERGING, STORING AND RETRIEVING INCREMENTAL BACKUP DATA - A method of managing backup data. The method includes accessing, via a backup manager, index data of an initial snapshot and accessing, via the backup manager, index data of a subsequent snapshot. The method further includes determining, via the backup manager, whether the index data of the subsequent snapshot is different from the index data of the initial snapshot. Responsive to a determination that the index data of the subsequent snapshot is different from the index data of the initial snapshot, creating an updated index data and creating an updated snapshot with the updated index data. | 05-23-2013 |
20130151471 | ACTIVE FILE INSTANT CLONING - Techniques and mechanisms are provided to instantly clone active files including active optimized files. When a new instance of an active file is created, a new stub is generated in the user namespace and a block map file is cloned. The block map file includes the same offsets and location pointers that existed in the original block map file. No user file data needs to be copied. If the cloned file is later modified, the behavior can be same as what happens when a de-duplicated file is modified. | 06-13-2013 |
20130159254 | SYSTEM AND METHODS FOR PROVIDING CONTENT VIA THE INTERNET - Systems and methods to enhance enhancing a service for a user. The system collecting documents viewed or words posted by a user. Determining a list of topic words for the user based on words in the documents viewed or words posted. Identifying a list of topic words associated with the user, based on words in the one or more documents and the words posted by the user. Assigning each of the topic words to at least one of a plurality of topics based on correlations between the topic words of the user and topic words from other users. Estimating a set of interest topics for the user based on the topics assigned to the topic words of the user. | 06-20-2013 |
20130173549 | Declarative View Objects - A view object is generated in a target deployment unit in a design time environment of a metadata repository. The view object is modeled on a business object of a source deployment unit. The source deployment unit includes process components of a business application that is physically decoupled from the target deployment unit. A subset of attributes of the business object of the source deployment unit is selected. The subset of attributes includes at least an outbound agent and an inbound agent implemented by a generic messaging framework. The view object is modeled in the target deployment unit with the subset of attributes of the business object. The inbound agent of the view object is configured for receiving a replication message from the outbound agent of the business object, and the replication message includes replication data for configuring the view object only with data from the business object. | 07-04-2013 |
20130173550 | FILE SYSTEM QUIESCING DRIVER - A technique is disclosed for quiescing a file system. The technique includes holding a change request, flushing the file system, and releasing the change request. Flushing may include sending a flush request, determining whether a cache associated with the file system is flushed, and in the event that the cache is not flushed, resending the flush request and determining whether the cache is flushed. | 07-04-2013 |
20130173551 | FAST SNAPSHOTS - A fast snapshot is configured to store a state of a computing environment at a point in time. The fast snapshot operation is performed by avoiding reference counts of one or more data units associated with the snapshot from being updated at a creation and a deletion time. | 07-04-2013 |
20130173552 | SPACE EFFICIENT CASCADING POINT IN TIME COPYING - Embodiments for space-efficient cascading point-in-time copying of source data by creating a plurality of cascading point-in-time target copies, the target copies being created at different points in time, are provided. Data is physically copied form the source to a repository to create a physical copy, and a data mapping is created that associates the physical copy with a most recent target copy. | 07-04-2013 |
20130212068 | DATABASE POINT-IN-TIME RESTORE AND AS-OF QUERY - A database is queried as of any wall-clock time within a retention period, via undo that uses database snapshots and a list of page level modifications. The snapshot is user-identified, automatically generated, or extracted from a backup. The list is maintained in a transaction log by persisting page content before a page is re-used, persisting deleted rows before they are moved, persisting compensation log record undo information, and/or logging a full page. To rewind an entire database, the undo scans the transaction log in reverse LSN order and undoes all page modifications. Undo reverses reallocated pages, table truncation, and/or table deletion, as well as page-level modifications of a schema, metadata values, and/or system tables. An as-of query is handled using as-of page(s) from a sparse page file. If the sparse page file does not already contain the responsive page(s), they are created and added to it. | 08-15-2013 |
20130218840 | SYSTEM AND METHOD FOR BUILDING A POINT-IN-TIME SNAPSHOT OF AN EVENTUALLY-CONSISTENT DATA STORE - A method and system for building a point-in-time snapshot of an eventually-consistent data store. The data store includes key-value pairs stored on a plurality of storage nodes. In one embodiment, the data store is implemented as an Apache® Cassandra database running in the “cloud.” The data store includes a journaling mechanism that stores journals (i.e., inconsistent snapshots) of the data store on each node at various intervals. In Cassandra, these snapshots are sorted string tables that may be copied to a back-up storage location. A cluster of processing nodes may retrieve and resolve the inconsistent snapshots to generate a point-in-time snapshot of the data store corresponding to a lagging consistency point. In addition, the point-in-time snapshot may be updated as any new inconsistent snapshots are generated by the data store such that the lagging consistency point associated with the updated point-in-time snapshot is more recent. | 08-22-2013 |
20130218841 | SYSTEMS AND METHODS FOR PROVIDING BUSINESS CONTINUITY SERVICES - Systems and methods for providing business continuity services after a disaster or other loss of data are provided. The system and methods include accessing, replicating, and storing customer data. In the event of a disaster or other loss of data, the stored data is used to create fully recovered systems. The systems and methods provide for a remote data center that offers protection against physical disasters. The systems and methods include providing a virtual recovered operating system environment identical to the source operating system environment in less than 8 hours after notification of a disaster. | 08-22-2013 |
20130238559 | MIGRATION OF COMPUTER DATA - Migration of computer information. In one example embodiment, a method for migration of computer data includes modifying a volume boot record of a destination volume to a first state in which at least a portion of the destination volume becomes inaccessible to a standard file system, writing one or more snapshots of a source volume to the inaccessible portion of the destination volume while the volume boot record is in the first state, and restoring the volume boot record to a second state in which the inaccessible portion of the destination volume becomes accessible to the standard file system. | 09-12-2013 |
20130246359 | COMPUTER PRODUCT, VERIFICATION SUPPORT METHOD, AND VERIFICATION SUPPORT APPARATUS - A computer-readable recording medium stores a program that causes a computer to execute a verification support process that includes acquiring a series of data transmitted and received between apparatuses; creating a plurality of data groups by dividing the series of acquired data; detecting among the created data groups, a data group that includes given data acting as an issuance request for identification information of a transmission source; adding the given data to the beginning of subsequent data groups that are among the created data groups and transmitted after the detected data group; and outputting the subsequent data groups to which the given data has been added. | 09-19-2013 |
20130246360 | SYSTEMS AND METHODS FOR ANALYZING SNAPSHOTS - This application describes techniques for creating a second snapshot of a first snapshot of a set of data, modifying the first snapshot, and reverting the modifications to the first snapshot. For example, portions of one or more transaction logs may be played into a database to put the database in a particular state a particular point in time. The second snapshot may then be used to revert to a prior state of the database such that additional transaction logs may be played into the database. These techniques enable the ability to put the database into multiple states as the database existed at multiple points in time. Therefore, data can be recovered from the database as the data existed at different points in time. Moreover, individual data objects in the database can be accessed and analyzed as the individual data objects existed at different points in time. | 09-19-2013 |
20130246361 | SYSTEM AND METHOD FOR GENERATING AND MANAGING QUICK RECOVERY VOLUMES - The invention relates to computer readable medium storing program code which when executed on a computer causes the computer to perform a method for creating a quick recovery volume of a primary data set used by a first computer in a backup storage system, which includes identifying a snapshot image of the primary data set generated by a snapshot application, creating the quick recovery volume of the primary data set from the snapshot image of the primary data set and controlling transfer of data from the first computer to an archival storage unit. In one embodiment, the invention provides a method for creating a quick recovery volume of a primary data set that includes creating a snapshot image of the primary data set and creating a quick recovery volume of the primary data set from the snapshot image of the primary data set. | 09-19-2013 |
20130262387 | UTILIZING SNAPSHOTS FOR ACCESS TO DATABASES AND OTHER APPLICATIONS - A method and system for utilizing snapshots to provide copies of a database or other application or large data structure to computing devices receives a request for access to a copy of a database, and performs a snapshot of a storage volume containing the requested database. The system then clones the snapshot and mounts the snapshot to a computing device, thus enabling the computing device to access a copy of the database. In some examples, the system automatically updates copies of a database on a scheduled basis (e.g., daily or weekly basis) to refresh a database regularly. | 10-03-2013 |
20130275376 | CLOUD BASED VIRTUAL ENVIRONMENT VALIDATION - Techniques for providing on-demand validation services for wager-based virtual machines deployed in a cloud based virtual environment. In some implementations, data sources store master deployment sets containing virtual machines. The master deployment sets may be deployed to component servers to provide a gaming related software services to remote client machines. The on-demand service takes snapshots of the virtual machines in the deployment and the virtual machines in the master deployment set. The snapshots are compared to ensure that important files in the master deployment set have not been improperly modified in the deployment. In some implementations, a secure hashing algorithm creates signatures for the snapshots prior to the comparison and the signatures are compared. The validation result may be sent to a remote client that requested the validation. | 10-17-2013 |
20140032498 | SYSTEMS, METHODS, AND MEDIA FOR SYNTHESIZING VIEWS OF FILE SYSTEM BACKUPS - Systems, methods, and media for synthesizing a view of a file system are provided herein. Methods may include receiving a request to obtain a view of at least a portion of a file system backup for a device, responsive to the request, mounting one or more backup files for the device on a backup node, generating a view of the at least a portion of a file system created from the one or more mounted backup files, the view being accessible via the intermediary node that is communicatively coupled with the backup node. | 01-30-2014 |
20140040205 | System and Methods for Implementing a Server-Based Hierarchical Mass Storage System - Setting up and supporting the computer infrastructure for a remote satellite office is a difficult task for any information technology department. To simplify the task, an integrated server system with a hierarchical storage system is proposed. The hierarchical storage system includes the ability to store data at an off-site cloud storage service. The server system is remotely configurable and thus allows the server to be configured and populated with data from a remote location. | 02-06-2014 |
20140052692 | Virtual Machine Snapshot Backup Based on Multilayer De-duplication - The present disclosure provides an example method and system for virtual machine backup based on multilayer de-duplication. A virtual machine snapshot is divided into multiple child data blocks. Each child data block is divided into multiple data segments. Multilayer de-duplication is applied to the virtual machine snapshot to exclude data causing duplicate backup in the virtual machine snapshot. The remaining virtual machine snapshot data after the processing of the multilayer de-duplication is stored. | 02-20-2014 |
20140052693 | Datacenter Workflow Automation Scenarios Using Virtual Databases - Information from multiple databases is retrieved and stored on a database storage system. Multiple point-in-time copies are obtained for each database. A point-in-time copy retrieves data changed in the database since the retrieval of a previous point-in-time copy. A virtual database (VDB) is created by creating a set of files in the data storage system. Each file in the set of files created for a VDB is linked to the database blocks on the database storage system associated with a point-in-time copy of the source database. The set of files associated with the VDB are mounted on a database server allowing the database server to read from and write to the set of files. Workflows based on VDBs allow various usage scenarios based on databases to be implemented efficiently, for example, testing and development, backup and recovery, and data warehouse building. | 02-20-2014 |
20140059008 | RESOURCE ALLOCATION ANALYSES ON HYPOTHETICAL DISTRIBUTED COMPUTER SYSTEMS - A system and method for performing resource allocation analyses on hypothetical distributed computer systems uses a user-modified snapshot of a hypothetical distributed computer system to execute a resource allocation analysis. The user-modified snapshot includes configurations and resource usage information of at least some components of the hypothetical distributed computer system. | 02-27-2014 |
20140067763 | TECHNIQUES FOR RECOVERING A VIRTUAL MACHINE - Techniq ues for recovering a virtual machine are disclosed. In one particular embodiment, the techniques may be realized as a method for recovering a virtual machine comprising the steps of selecting a first backup copy of a virtual machine in a first data store, selecting a second data store; enabling use of the virtual machine by reading from the first data store and writing to the second data store, selecting a second backup copy of the virtual machine, and migrating the virtual machine from the second backup copy to the second data store. | 03-06-2014 |
20140074787 | USING A METADATA IMAGE OF A FILE SYSTEM AND ARCHIVE INSTANCE TO BACKUP DATA OBJECTS IN THE FILE SYSTEM - Provided are a computer program product, system, and method for using a metadata image of a file system and archive instance to backup files in the file system. A point-in-time backup is performed of files in the file system as of a point-in-time. A metadata image includes information on files and directories in the file system as of the point-in-time. Files in the point-in-time backup are backed up to a backup storage. A backup database has records on the files backed-up from the file system. Each record in the backup database has a unique identifier for each backed-up file and a location of the backed-up file in the backup storage. An archive instance is generated including a copy of the database records for the files in the point-in-time backup. The metadata image and the archive instance are associated for the point-in-time backup. | 03-13-2014 |
20140074788 | DATA SYNCHRONIZATION IN A CLOUD INFRASTRUCTURE - A synchronization infrastructure that synchronizes data stored between components in a cloud infrastructure system is described. A first component in the cloud infrastructure system may store subscription information related to a subscription order which may in turn be utilized by a second component in the cloud infrastructure system to orchestrate the provisioning of services and resources for the order placed by the customer. The synchronization architecture utilizes transactionally consistent checkpoints that describe the state of the data stored in the components to synchronize the data between these components. | 03-13-2014 |
20140081918 | TABLE FORMAT FOR MAP REDUCE SYSTEM - A key-value store provides column-oriented access to data in a distributed and fault tolerant manner. Data can be inserted into the data store and data can be retrieved either randomly or sequentially from the data store at high rates. Keys for a table are ordered and the entire table is divided into key ranges. Each key range is handled by a table which itself is divided into key ranges called a partition. Partitions are also divided into segments. Such recursive division into smaller and smaller key ranges provides parallelism. At the highest level, operations on tablets can be distributed to different nodes. At lower levels, different threads can handle operations on individual segments. Large-scale restructuring operations can be decomposed into operations on individual segments so that a global lock on larger objects does not need to be kept across the entire operation. | 03-20-2014 |
20140095438 | TRACKING ROW AND OBJECT DATABASE ACTIVITY INTO BLOCK LEVEL HEATMAPS - A method, apparatus, and system for tracking row and object database activity into block level heatmaps is provided. Database activity including reads, writes, and creates can be tracked by a database management system at the finest possible level of granularity, or the row and object level. To efficiently record the tracked database activity, a two-part structure is described for writing the activity into heatmaps. A hierarchical in-memory component may use a dynamically allocated sparse pool of bitmap blocks. Periodically, the in-memory component is persisted to a stored representation component, sharable with multiple database instances, which may include consolidated last access times and/or a history of heatmap snapshots to reflect access over time. The heatmaps may then be externalized to database users and applications to provide and support a variety of features. | 04-03-2014 |
20140108348 | RETRIEVING POINT-IN-TIME COPIES OF A SOURCE DATABASE FOR CREATING VIRTUAL DATABASES - A storage system maintains copies of a source database to allow virtual databases to be provisioned. Transaction logs received from the source database are applied to database blocks stored in the storage system to update the database blocks. The storage system checks if there are defect in the transaction logs of the source database. If a defect in transaction logs is detected, the storage system obtains a latest copy of the source database. The storage system matches database blocks of the received copy with database blocks already available in the storage system to determine whether a corresponding database block is already available in the storage system. If a received database block is different from database blocks already available at the storage system, the received database block is stored in the storage system. The database blocks may be matched using a hash value of the database blocks. | 04-17-2014 |
20140108349 | MERGING AN OUT OF SYNCHRONIZATION INDICATOR AND A CHANGE RECORDING INDICATOR IN RESPONSE TO A FAILURE IN CONSISTENCY GROUP FORMATION - A first data structure stores indications of storage locations that need to be copied for forming a consistency group. A second data structure stores indications of new host writes subsequent to starting a point in time copy operation to form the consistency group. Read access is secured to a metadata storage area and a determination is made as to whether the second data structure indicates that there are any new host writes. In response to determining that the second data structure indicates that there are new host writes, write access is secured to the metadata storage area, the first data structure is updated with contents of the second data structure to determine which additional storage locations need to be copied for formation of a next consistency group, and the second data structure is updated to indicate that that the second data structure is in an initialized state. | 04-17-2014 |
20140108350 | SYSTEM FOR LIVE-MIGRATION AND AUTOMATED RECOVERY OF APPLICATIONS IN A DISTRIBUTED SYSTEM - A method and apparatus for distribution of applications amongst a number of servers, ensuring that changes to application data on a master for that application are asynchronously replicated to a number of slaves for that application. Servers may be located in geographically diverse locations; the invention permits data replication over high-latency and lossy network connections and failure-tolerance under hardware and network failure conditions. Access to applications is mediated by a distributed protocol handler which allows any request for any application to be addressed to any server, and which, when working in tandem with the replication system, pauses connections momentarily to allow seamless, consistent live-migration of applications and their state between servers. Additionally, a system which controls the aforementioned live-migration based on dynamic measurement of load generated by each application and the topological preferences of each application, in order to automatically keep servers at an optimum utilisation level. | 04-17-2014 |
20140108351 | DATA STORAGE SYSTEM UTILIZING PROXY DEVICE FOR STORAGE OPERATIONS - A data storage environment can include a secondary storage computing device that acts as a proxy for other secondary storage computing devices. For example, the secondary storage computing device receives a storage operation request from one or more of the other secondary storage computing devices, such as a request to create a snapshot of client data. The secondary storage computing device generally acts as an intermediary between the other secondary storage computing devices and the storage device to carry out the snapshots or other storage operations. The secondary storage computing device may further receive a notification upon completion of the storage operations, and transmit relevant data to the requesting secondary storage computing device regarding the storage operation. | 04-17-2014 |
20140114922 | SYSTEM AND METHOD FOR GENERATING AND MANAGING QUICK RECOVERY VOLUMES - The invention relates to computer readable medium storing program code which when executed on a computer causes the computer to perform a method for creating a quick recovery volume of a primary data set used by a first computer in a backup storage system, which includes identifying a snapshot image of the primary data set generated by a snapshot application, creating the quick recovery volume of the primary data set from the snapshot image of the primary data set and controlling transfer of data from the first computer to an archival storage unit. In one embodiment, the invention provides a method for creating a quick recovery volume of a primary data set that includes creating a snapshot image of the primary data set and creating a quick recovery volume of the primary data set from the snapshot image of the primary data set. | 04-24-2014 |
20140136483 | METHOD AND SYSTEM FOR MANAGING METADATA IN A STORAGE ENVIRONMENT - Method and system is provided for managing metadata for a plurality of data containers that are stored at one or more storage volumes in a storage system. The metadata is collected from one or more storage volumes and then provided to a catalog module. The catalog module pre-processes the metadata and then generates a searchable data structure. The searchable data structure may then be used to respond to a user request for information regarding the storage system. | 05-15-2014 |
20140136484 | METHOD AND SYSTEM OF PERFORMING INCREMENTAL SQL SERVER DATABASE BACKUPS - A system, method, and medium for performing incremental backups of a Microsoft SQL server database. A snapshot of the database is created, and then a map identifying the changed extents is retrieved from the snapshot. The changed extents are then retrieved from the snapshot and stored in a backup storage device. For a restore operation, a full database backup file is written to a storage device and then the changed extents from a stored incremental backup file may be merged with the full backup file. Next, the database server is notified of the reconstructed file and then the reconstructed file is mounted by the database server as a live instance of the database. | 05-15-2014 |
20140149352 | HIGH AVAILABILITY FOR CLOUD SERVERS - A high availability system in a cloud computing environment includes a snapshot manager disposed in a mirror environment having at least one computer server and a plurality of virtual machines disposed in a production environment. Each of the plurality of virtual machines includes a snapshot agent configured to perform a method. The method includes periodically taking snapshots of the virtual machine associated with the snapshot agent, determining a delta image based on a change between a current snapshot and a previous snapshot, removing previous snapshots in the virtual machine and transmitting the delta image to the snapshot manager. The snapshot manager is configured to store a recovery image for each of the plurality of virtual machines and to merge the received delta image with the recovery image to update the recovery image. | 05-29-2014 |
20140149353 | Version Garbage Collection Using Snapshot Lists - Systems, methods and computer program product embodiments for providing version garbage collection using snapshot lists are disclosed herein. Version garbage collection using snapshot lists includes storing, by at least one processor, versions of a record in a database table, the record comprising a record value and a version timestamp, storing, by the at least one processor, active snapshots in two levels of active snapshot lists, an active snapshot comprising a transaction identifier and a snapshot timestamp, determining, by the at least one processor, a minimum active snapshot from the active snapshots in the two levels of active snapshot lists and deleting, by the at least one processor, versions of the record having a version timestamp earlier than a snapshot timestamp of the minimum active snapshot. | 05-29-2014 |
20140149354 | HIGH AVAILABILITY FOR CLOUD SERVERS - A high availability system in a cloud computing environment includes a snapshot manager disposed in a mirror environment having at least one computer server and a plurality of virtual machines disposed in a production environment. Each of the plurality of virtual machines includes a snapshot agent configured to perform a method. The method includes periodically taking snapshots of the virtual machine associated with the snapshot agent, determining a delta image based on a change between a current snapshot and a previous snapshot, removing previous snapshots in the virtual machine and transmitting the delta image to the snapshot manager. The snapshot manager is configured to store a recovery image for each of the plurality of virtual machines and to merge the received delta image with the recovery image to update the recovery image. | 05-29-2014 |
20140156601 | SYSTEMS AND METHODS FOR HIERARCHICAL REFERENCE COUNTING VIA SIBLING TREES - Systems and methods for hierarchical reference counting via sibling trees are provided. The hierarchical data structure, together with its associated operations, can efficiently maintain reference counts and significantly reduce input/output (IO) operations compared to traditional techniques. The data structure presented here is applicable to any directed acyclic graph (DAG-type) structure where reference counts are used. Various embodiments of the present invention use a data structure to maintain a “sibling pointer” (pointing to the sibling node as a way to avoid reference count updates) and a “sibling count.” When nodes in the tree diverge, the sibling pointer and sibling count are updated as opposed to directly manipulating the reference counts of the children of the diverging nodes. Various other embodiments can use additional entries or fields that allow for improved efficiency and advantages. | 06-05-2014 |
20140172801 | SYSTEM, METHOD AND COMPUTER READABLE MEDIUM FOR EFFIEICNT SNAPSHOT-BASED MIRRORING OPERATIONS - A storage system that may include a management module, a communication module and a storage module; wherein the management module is arranged to receive, at an intermediate point in time that occurs between the first point in time and a second point in time, a first request that indicates that a certain extent of the second logical volume is irrelevant; participate in a creation of second point in time snapshots of the first and second logical volumes; select, in response to the first request, out of all data deltas generated between the first and second point in time, selected data deltas to be transmitted to the other storage system; wherein the selected data deltas exclude data deltas associated with the certain extent that were generated between the first point in time and the intermediate point in time. | 06-19-2014 |
20140172802 | INFORMATION PROCESSOR AND BACKUP METHOD - An information processor coupled to a storage apparatus that stores information, includes: a creation unit configured to create a snapshot of a file system that manages first information stored in the storage apparatus and to output the snapshot to the storage apparatus; a writing unit configured to write second information stored in cache memory onto the storage apparatus after the snapshot has been created; and a replication instruction unit configured to instruct the storage apparatus to create a replication of the first information stored in the storage apparatus after the second information has been written and the snapshot. | 06-19-2014 |
20140181027 | SYSTEMS AND METHODS FOR STATE CONSISTENT REPLICATION - Systems and methods are disclosed for state consistent replication of client data set on a client computer by generating a snapshot of the client data set on a local volume; synchronizing with a remote server volume corresponding to the local volume to create a copy of the client data set on the remote server; performing a master to slave replication of the data set; and taking a snapshot of the server data set to create a mirror of the snapshot of the client data set on the server. | 06-26-2014 |
20140181028 | SYSTEM AND METHOD FOR PERFORMING AN IMAGE LEVEL SNAPSHOT AND FOR RESTORING PARTIAL VOLUME DATA - The present invention relates to a method for performing an image level copy of an information store. The present invention comprises performing a snapshot of an information store that indexes the contents of the information store, retrieving data associated with the contents of the information store from a file allocation table, copying the contents of the information store to a storage device based on the snapshot, and associating the retrieved data with the copied contents to provide file system information for the copied contents. | 06-26-2014 |
20140181029 | ROLLING CACHE CONFIGURATION FOR A DATA REPLICATION SYSTEM - Performing data management operations on replicated data in a computer network. Log entries are generated for data management operations of an application executing on a source system. Consistency point entries are used to indicate a time of a known good, or recoverable, state of the application. A destination system is configured to process a copy of the log and consistency point entries to replicate data in a replication volume, the replicated data being a copy of the application data on the source system. When the replicated data represents a known good state of the application, as determined by the consistency point entries, the destination system(s) may perform a storage operation (e.g., snapshot, backup) to copy the replicated data and to logically associate the copied data with a time information (e.g., time stamp) indicative of the source system time when the application was in the known good state. | 06-26-2014 |
20140181030 | IDENTIFYING DATA ITEMS - Each of a plurality of data items has an associated update time. Identifying updated data items comprises identifying those data items that have an update time later than a last synchronization time. The data items are updated such that each data item is associated with one of a plurality of update tokens. Each update token is associated with updates performed up to a respective bound period from a time at which the update token is superseded by a successive update token. The update tokens are allocated successively in a monotonic sequence. Data indicating a last synchronization time is received. An update token is identified that is associated with one or more updates performed relative to a point in time related to the last synchronization time by the bound period. Data items having an update time after the last synchronization time are identified on the basis of the identified update token. | 06-26-2014 |
20140195490 | UNORDERED IDEMPOTENT LOGICAL REPLICATION OPERATIONS - A method and apparatus for replicating a data container of a source storage server at the logical level in an unordered stream of individual data units are described. In certain embodiments, the replication operations can be performed without regard to the differences in geometry of physical persistent storage of the source and destination storage servers and without regard to the differences in data container format of the source and destination storage servers. An initial replication operation of the source data container is performed by transferring the data objects within the source data container to a replica data container in the destination storage server as an unordered stream of individual data units while preserving data object identifiers of the source data objects. Afterwards, incremental replication operations can be performed to capture modifications to the source data container over time after the initial replication operation. | 07-10-2014 |
20140201149 | CONSISTENT BOOKMARK - A request to generate a snapshot of the master file system for replication is received. The master file system is frozen and a freeze callback function is invoked to generate a consistent point in time. The freeze callback function initiates generation of a bookmark event based on a current time. The bookmark event indicates the consistent point in time for generation of the snapshot. The freeze callback function also initiates capturing I/O events intended for the master file system in order and suspending journal flushing to data storage so as to avoid deadlock of the master file system. The freeze callback function is forwarded and used to generate the snapshot by indicating the consistent point in time to start generation of the snapshot. | 07-17-2014 |
20140201150 | SINGLE SNAPSHOT FOR MULTIPLE AGENTS - A data storage system according to certain aspects can share a single snapshot for multiple applications and/or agents. For example, the data storage system can receive snapshot commands from multiple applications and/or agents, and can group them for a single snapshot (e.g., based on time of receipt of the snapshot commands). Data associated with the multiple applications and/or agents may reside on a single LUN or volume. The data storage system can take a single snapshot of the LUN or volume, and generate metadata regarding which portion of the snapshot is related to which application. The single snapshot can be stored in one or more secondary storage devices. The single snapshot may be partitioned into portions relating to different applications and stored separately. | 07-17-2014 |
20140222759 | UTILIZING SNAPSHOTS FOR ACCESS TO DATABASES AND OTHER APPLICATIONS - A method and system for utilizing snapshots to provide copies of a database or other application or large data structure to computing devices receives a request for access to a copy of a database, and performs a snapshot of a storage volume containing the requested database. The system then clones the snapshot and mounts the snapshot to a computing device, thus enabling the computing device to access a copy of the database. In some examples, the system automatically updates copies of a database on a scheduled basis (e.g., daily or weekly basis) to refresh a database regularly. | 08-07-2014 |
20140236897 | SYSTEM, METHOD AND NON-TRANSITORY COMPUTER READABLE MEDIUM FOR COMPRESSING GENETIC INFORMATION - A method that may executed by a main storage system and may include compressing the vast genetic information database to provide a compressed genetic information database; storing the compressed genetic information database, receiving updates to the vast genetic information database; updating the compressed genetic information database; generating different point in time snapshots of the compressed genetic information database; calculating differences between the different point in time snapshots of the compressed genetic information database; and transmitting the differences to at least one secondary storage system that is accessible to a user. | 08-21-2014 |
20140236898 | SYSTEM AND METHOD FOR FACILITATING ELECTRONIC DISCOVERY - A method for facilitating discovery of electronic data stored in a data storage system. The method includes generating a snapshot of the electronic data, wherein the snapshot permits read access to the data, and a copy-on-write technique is used to perform modifications to the data, such that the snapshot is immutable but ongoing user operations with respect to the data can be performed substantially without interruption. The method also includes transmitting data of the snapshot over a network to a data cache server to which an analysis computer system is communicatively coupled. In some embodiments, the data cache server may store a local copy of the transmitted data of the snapshot. In this regard, the data cache server may determine whether data requested by the analysis computer system is stored locally, and if so, the data cache server may transmit the data requested directly to the analysis computer system. | 08-21-2014 |
20140236899 | SNAPSHOT MANAGEMENT IN HIERARCHICAL STORAGE INFRASTRUCTURE - Embodiments of the present invention disclose a method, computer program product, and system for snapshot management in a storage infrastructure. A computer identifies one or more snapshots within layers of the storage infrastructure. The computer determines one or more relationships of the one or more identified snapshots of the storage infrastructure. The determined relationships include, at least in part, relations of one or more entities included in the one or more snapshots to additional one or more entities in the one or more snapshots of the storage infrastructure. The computer identifies the one or more duplicate snapshots by utilizing the one or more determined relationships of the one or more identified snapshots. The computer consolidates the one or more identified duplicate snapshots in the storage infrastructure. In another embodiment, the computer identifies one or more inconsistent snapshots, and consolidates the one or more inconsistent snapshots in the storage infrastructure. | 08-21-2014 |
20140236900 | SYSTEMS AND METHODS FOR PERFORMING REPLICATION COPY STORAGE OPERATIONS - A system and method are provided for performing storage operations relating to a first secondary copy of electronic data. A storage policy or storage preferences may dictate that a replication copy should be used in storage operations performed to a particular client, sub-client, data, media or other item. Based on the storage policy, when a new client, sub-client, data, media or other item is received, a media agent determines whether there is a replication copy of the item. In the absence of a replication copy, one may be created. The replication copy may be provided by a third party application, or created by the client or a storage management system component. Information regarding the replication copy and its corresponding first secondary copy may be stored in a database. To optimize use of system resources, storage operations relating to the first secondary copy may be performed using the replication copy instead of the first secondary copy. | 08-21-2014 |
20140244585 | DATABASE SYSTEM PROVIDING SINGLE-TENANT AND MULTI-TENANT ENVIRONMENTS - A database service may provide multi-tenant and single-tenant environments in which tables may be maintained on behalf of clients. The service (or underlying system) may create database instances and tables in either or both types of environments (e.g., by default or according to various parameter values specified in requests to create the instances or tables). When receiving and servicing requests directed to a table hosted in a single-tenant environment, the system may elide at least some of the authentication or metering operations that would be performed when servicing requests directed to tables hosted in a multi-tenant environment. Tables may be moved from a single-tenant environment to a multi-tenant environment, or vice versa, automatically by the system (e.g., dependent on an observed, expected, or desired throughput) or in response to an explicit request from a client to do so (e.g., to increase throughput or reduce cost). | 08-28-2014 |
20140244586 | SYSTEMS AND METHODS FOR CONTINUOUS DATA REPLICATION - Systems and methods for intelligent data replication are provided, which may include the identification and use of consistency points in application data, such that one or more replication volumes may be created using an “application aware” replication process that allows the system to intelligently replicate data or other information (e.g., metadata) relating to a particular process, application or specified set of data. | 08-28-2014 |
20140250075 | USING A FILE SYSTEM INTERFACE TO ACCESS A REMOTE STORAGE SYSTEM - A non-transitory computer readable medium that may store instructions for receiving, by a local storage system, a file system command that is sent from a host computer, the file system command is related to a remote snapshot of a local file system entity; wherein the remote snapshot of the local file system entity is generated by a process that may include sending a snapshot of the local file system entity from the local storage system to a remote storage system; wherein the local file system entity belongs to a local file system stored at the local storage system; and responding to the file system command, wherein the responding may include utilizing or generating remote snapshot file system information that is representative of the remote snapshot of the local file system entity. | 09-04-2014 |
20140250076 | IMAGE LEVEL COPY OR RESTORE, SUCH AS IMAGE LEVEL RESTORE WITHOUT KNOWLEDGE OF DATA OBJECT METADATA - A system and method for performing an image level restore of data is described. In some examples, the system receives a request to restore a file and transmits the request to an intermediate component. The intermediate component may then retrieve a directory file from an image of a secondary copy of a data set, identify a location of the file from the directory file, and provide the location to the requestor. | 09-04-2014 |
20140258235 | METHOD TO PROVIDE USER DOMAIN MANAGEMENT OF SNAPSHOTS FOR VIRTUAL DESKTOPS USING CENTRALIZED PORTAL - A snapshot agent executing on a virtual desktop allows a user to both create snapshots of the VM image hosting the virtual desktop and to revert that VM instance to such snapshots. In addition to a snapshot agent that executes within a given VM instance, another embodiment provides a user with network access to a portal snapshot management interface, e.g., via a web application. The web application can present the list of VM instances, and snapshots for each such VM instance, owned by an authenticated user. The user can then interact with the web application to create a new snapshot for (or revert to) an existing snapshot for the owned VM instances. | 09-11-2014 |
20140258236 | SINGLE INDEX TO QUERY MULTIPLE BACKUP FORMATS - The disclosed techniques include generation of a single index table when backing up data in a first backup format to a backup storage system that uses a second backup format. Using the single index table, a query for a data item can be answered by searching the single index table. The single index table avoids having to search through multiple index tables, each corresponding to a different backup format that may be used for backing up the searched data item. | 09-11-2014 |
20140279905 | TOKEN-BASED ADMISSION CONTROL FOR REPLICATED WRITES - Methods and apparatus for token-based admission control for replicated writes are disclosed. Data objects are divided into partitions, and corresponding to each partition, at least a master replica and a slave replica are stored. A determination as to whether to accept a write request directed to the partition is made based at least in part on one or more of (a) available throughput capacity at the master replica, and (b) an indication, obtained using a token-based protocol, of available throughput capacity at the slave replica. If the write request is accepted, one or more data modification operations are initiated. | 09-18-2014 |
20140279906 | APPARATUS, SYSTEM AND METHOD FOR MULTIPLE SOURCE DISAMBIGUATION OF SOCIAL MEDIA COMMUNICATIONS - The present invention is directed to a system for understanding social media. The system may provide automated machine understanding of social media communications based on: social media assertions, social media statements and conversations, social connections, user profile info, crowd-sourced databases, Internet pages, and semantic networks. | 09-18-2014 |
20140279907 | Reducing Reading Of Database Logs By Persisting Long-Running Transaction Data - According to one embodiment of the present invention, a system reduces re-reading of database logs by persisting long running transaction data. The system processes the database log records of the database transaction log; generates a snapshot of the database log records at periodic intervals, wherein each snapshot includes database log records for pending transactions; and in response to an interruption in processing of the database log records, utilizes a snapshot to restore database log records for the pending transactions and resume processing of the database transaction log from a position succeeding the database log records of the selected snapshot. | 09-18-2014 |
20140279908 | METHOD AND SYSTEM FOR GENERATING AND DEPLOYING CONTAINER TEMPLATES - A method for creating a deployable zone template of a source zone, involving receiving, from the user an instruction to create the deployable zone template of a source zone including a zonepath dataset (ZPDS) and an application image (AI), where the ZPDS is a hierarchy of file systems in which an operating system image of the source zone is installed, creating a zonepath image file of the ZPDS, creating an application image file of the AI, collecting auxiliary zone data describing a dependency of the source zone and configuration a parameter of the source zone, creating an archive file including the zonepath image file, the application image file, and the auxiliary zone data, and combining the archive file and an executable wrapper script to obtain the deployable zone template. | 09-18-2014 |
20140279909 | EFFICIENT DATA SYNCHRONIZATION FOR STORAGE CONTAINERS - Performing data synchronization is disclosed, including: receiving an indication to synchronize a container to a snapshot, wherein the container has a first data state and an identity, wherein the snapshot corresponds to a second data state; causing the container to have the second data state corresponding to the snapshot; and maintaining the identity of the container. | 09-18-2014 |
20140279910 | PROVIDING DATA AGGREGATED FROM VARIOUS SOURCES TO A CLIENT APPLICATION - A system and a method are disclosed for generating a repository to be used on a client device. The repository is generated based on a repository format supported by the client device, which is identified by analyzing an empty repository created by the client device. The generated repository is configured with metadata that allows an operating system executing on the client device to communicate with the repository. Once generated, the repository is populated with data associated with a user of the client device. The populated repository is transmitted to the client device, where the repository is used by applications for retrieving and storing data. | 09-18-2014 |
20140310243 | Heart beacon cycle - Systemic, adaptive procedural template comprised of common building blocks forming template frameworks i.e., self-organizing, mutually reinforcing service, system, process, procedure components derived situational understanding, state meta data signaling replication systems consisting of TCP/IP heartbeat, heartbeat messages signaling during micro-macro report cycles of state meta-data sync deltas typed with , time stamped prior to data fusion-center insertion followed by reports aggregated, recalculated, relayed through synchronization, conversion gateways then merged into macro-cycle reports where metrics, metering are described by using Paul Revere meme linear, sequential hop count, water-drop in-pond meme geo-spatial temporal intensity measures, metrics recording sync deltas change across time/space viewed on appliqué displays using Russian Matryoshka doll techniques where each view adds to, changes the nature, meaning of composite views while retaining original appliqué views unique qualities as decision support aids in best effort, best practice by federated groups | 10-16-2014 |
20140310244 | ESSENTIAL METADATA REPLICATION - Methods, apparatus and computer program products implement embodiments of the present invention that include defining, in a storage system including receiving, by a storage system, a storage request, and identifying, based on the storage request, one or more storage management units. For each of the storage management units, a master partition table having multiple master entries and one or more backup partition tables is identified, each of the backup partition tables having backup entries in a one-to-one-correspondence with the master entries. The storage request is performed, and upon the storage request being performed, any changes to essential metadata in the one or more master partition tables are identified, and the identified changes are stored to the essential metadata in the one or more backup partition tables. | 10-16-2014 |
20140317057 | SYSTEMS AND METHODS FOR DIGITAL FULFILLMENT OF SYSTEM IMAGES - In accordance with embodiments of the present disclosure, an information handling system for deploying a target image to a particular target system may include a storage medium and a processor communicatively coupled to the storage medium. The process may be configured to receive one or more target images and store the one or more target images to the storage medium, receive unique system identifiers for each of one or more target systems and store the unique system identifiers to the storage medium, generate one or more entitlements binding each of the one or more target systems to a respective target image of the one or more target images based on the one or more target images and the unique system identifiers, and deploy a target image having an entitlement for the particular target system. | 10-23-2014 |
20140330784 | METHODS AND APPARATUS FOR CONTROLLING SNAPSHOT EXPORTS - Methods, apparatus, and computer-accessible storage media for controlling export of snapshots to external networks in service provider environments. Methods are described that may be used to prevent customers of a service provider from downloading snapshots of volumes, such as boot images created by the service provider or provided by third parties, to which the customer does not have the appropriate rights. A request may be received from a user to access one or more snapshots, for example a request to export the snapshot or a request for a listing of snapshots. For each snapshot, the service provider may determine if the user has rights to the snapshot, for example by checking a manifest for the snapshot to see if entries in the snapshot manifest belong to an account other than the customer's. If the user has rights to the snapshot, the request is granted; otherwise, the request is not granted. | 11-06-2014 |
20140351217 | DATABASE SNAPSHOT ANALYSIS - Analysis tools summarize and provide statistics from snapshot files. The analysis tools may provide a temporal view of the changes of the data values across two or more periods of time from one or more snapshot files to show trends in performance of the system. The analysis tools may include meta-data definitions for different sources of the snapshot information. | 11-27-2014 |
20140365440 | HIGH AVAILABILITY SNAPSHOT CORE - A high availability contact center is described along with various methods and mechanisms for administering the same. The contact center proposed herein enables snapshots of one instance of a work assignment engine to be transmitted to another server instance where they can be loaded and used as a backup to the original work assignment engine. | 12-11-2014 |
20140379658 | Constraint-based consistency with snapshot isolation - Efficient processing of concurrent atomic transactions is provided by identifying the constraints that need to be satisfied for correct application behavior. With these constraints identified, commit processing for a transaction can then refer to the constraints to see if committing the current transaction causes a problem with the constraints. If there is a conflict with the constraints, the transaction aborts. If there is no conflict with the constraints, the transaction commits. | 12-25-2014 |
20150019491 | Replication of Data Between Mirrored Data Sites - Computer-implemented methods and systems for replication of data between mirrored data sites are provided. An exemplary method may comprise receiving a data object at a mirrored data site, the mirrored data site including one or more data nodes. The data objects are replicated to the one or more data nodes internally. Then, a data object reference associated with the data object is generated. The reference referring to the data object is queued for transmission to all other mirrored data sites. The data object reference associated with the data object is transmitted to the other mirrored data sites. When the data object is received at each mirrored data site, it is replicated to one or more data nodes within the site. After transmitting the data object, the data object reference is discarded. | 01-15-2015 |
20150019492 | CLUSTERED FILESYSTEM WITH DATA VOLUME SNAPSHOT - A computer system with read/write access to storage devices creates a snapshot of a data volume at a point in time while continuing to accept access requests to the mirrored data volume by copying before making changes to the base data volume. Multiple snapshots may be made of the same data volume at different points in time. Only data that is not stored in a previous snapshot volume or in the base data volume are stored in the most recent snapshot volume. | 01-15-2015 |
20150026132 | HASH-BASED SNAPSHOTS - Methods and systems configured to provide hash-based snapshot services for a virtual storage are provided. The system includes a processor and memory coupled with the processor. The memory is configured to provide the processor with instructions for maintaining, by a hash-based snapshot module executing on the system, a file system of the virtual storage. The file system is associated with a plurality of data blocks. The virtual storage is supported by a hash-storage having a hash base-file and a hash-database. The hash-database is configured for storing the plurality of data blocks. And the hash base-file includes hash codes generated by applying a hash function to the plurality of data blocks. The memory is further configured to provide the processor with instructions for accessing, by the hash-based snapshot module, the file system using hash codes contained in the hash base-file to identify data blocks stored in the hash-database; creating, by the hash-based snapshot module, a first snapshot for the file system, wherein the first snapshot is associated with a first hash snapshot file copied based on the hash base-file; and accessing, by the hash-based snapshot module, the first snapshot using hash codes contained in the first hash snapshot file to identify data blocks stored in the hash-database. | 01-22-2015 |
20150026133 | PRODUCING AN IMAGE COPY OF A DATABASE OBJECT BASED ON INFORMATION WITHIN DATABASE BUFFER POOLS - According to one embodiment of the present invention, a system includes a processor to copy an object of a database system. The system determines one or more portions of the object that are active and reside within a buffer pool of the database system, and copies the determined portions of the object from the buffer pool. Remaining portions of the object that are non-active are copied from database storage. A copy of the object is created from the copied object portions. Embodiments of the present invention further include a method and program product for copying an object of a database system in substantially the same manner described above. | 01-22-2015 |
20150039562 | EFFICIENT BACKUP OF DATA - A method, article of manufacture, and apparatus for protecting data. In some embodiments, this includes taking a snapshot of a virtual machine, parsing the virtual machine to determine a header section and a file system, indexing the virtual machine based on the parsing, storing the index in a storage device, and storing the snapshot in a deduplicated data storage device. | 02-05-2015 |
20150066856 | FLOW STATE TOTALS AND AUTO FLOW WAREHOUSING - A computing device can automatically generate a flow diagram showing statuses that objects in a system can possess, and the possible transitions between these statuses. Using snapshots of database data, the device can determine how the statuses of these objects have changed over time. The device can analyze the data to suggest which database fields likely represent object status. The device can render the flow diagram to illustrate system states at different selected times. Each rendered flow diagram can indicate, for the selected time point, the quantity of objects that possessed each status at that time, and, for a selected time interval, the quantity of objects that changed from each status to each other status during that time interval. The statuses can be represented in the flow diagram as status bubbles having sizes that are based on the quantities of objects have those bubble's statuses at the selected time point. | 03-05-2015 |
20150066857 | REPLICATION OF SNAPSHOTS AND CLONES - Performing replication of snapshots between storage systems is disclosed, including: receiving a request to store at a destination system a snapshot data to represent at the destination system a state of a set of data at a first point-in-time, wherein a first source system snapshot data that represents at a source system the state of the set of data at the first point-in-time depends on a second source system snapshot data that represents at the source system a state of the set of data at a second point-in-time; and determining the snapshot data to represent at the destination system the state of the set of data at the first point-in-time, wherein the snapshot data is determined based on data comprising the first source system snapshot data and a destination system snapshot data that represents at the destination system a state of the set of data at a third point-in-time. | 03-05-2015 |
20150066858 | SYSTEMS AND METHODS FOR RESUMABLE REPLICATION - Implementations described and claimed herein provide systems and methods for resumable replication. In one implementation, an interruption in a transfer between a source and a target is identified. The transfer includes a send stream generated by the source and configured for receipt by the target. The send stream includes one or more snapshots of the source. A receive checkpoint generated by the target is received at the source. The receive checkpoint indicates data successfully received into the target during the transfer prior to the interruption. The transfer is resumed based on the received checkpoint. The resumed transfer skips any of the one or more snapshots and all data in a resumable snapshot already existing on the target. A complete transfer from the source to the target is verified using a chain of custody. | 03-05-2015 |
20150074054 | VIRTUAL MACHINE CLONING - Exemplary methods, apparatuses, and systems create a parent snapshot of the parent virtual disk in response to receiving a request to clone a parent virtual machine. A clone virtual machine is created with a clone redo log file and clone virtual disk. Copying of the parent virtual disk to the clone virtual disk is initiated. A first active link from the clone redo log file to the parent snapshot is created to provide the clone virtual machine access to the parent snapshot. In response to determining that the copying of the parent virtual disk to the clone virtual disk is complete, the first active link is removed and a second active link is created from the clone redo log file to the clone virtual disk or to a snapshot of the clone virtual disk. | 03-12-2015 |
20150074055 | Auto-Snapshot Manager Analysis Tool - The invention pertains to a method and information handling system (IHS) for analyzing snapshot operation data of one or more snapshot operations associated with at least one storage device and at least one host computer. An embodiment of a method of the present invention begins by locating the snapshot operation data. Next, configuration information is assembled from the snapshot operation data. Further, debug data associated with the one or more snapshot operations is stored. An analysis is performed including the snapshot operation data, the configuration information, and the stored debug data. Next, the method identifies one or more issues and one or more action plans for resolution based upon the analysis. Finally, the method provides a report to one or more users including the configuration information, the one or more identified issues, and the one or more action plans. | 03-12-2015 |
20150081636 | SYSTEMS AND METHODS FOR PROVIDING SNAPSHOTS OF APPLICATIONS TO REMOTE LOCATIONS WITH MINIMAL PERFORMANCE IMPACT - Systems and methods herein obtain snapshots of one or more applications, while having minimal impact on performance of the applications. Embodiments may involve obtaining snapshots of modified application data within a node without disturbing the operations of the application. Systems may be configured to leverage the fast characteristics of local storage devices while utilizing the advantages provided by the remote storage of data. One or more applications may be preconfigured to record data modifications in one or more associated application state storages located on local memory. Further, one or more systems may operate in the background to identify modifications made to the associated application state storages and to determine an appropriate moment to take one or more snapshots of the stored data and transfer the one or more snapshots to one or more remote locations to be stored. Several factors may be used to determine when an appropriate moment has occurred. | 03-19-2015 |
20150081637 | DIFFERENCE DETERMINATION IN A DATABASE ENVIRONMENT - Techniques are disclosed to determine differences between a source table and a target table in a database environment, as being persistent or transient. A first set of differences between the source table and the target table is determined at a first point in time. A second set of differences between the source table and the target table is determined at a second point in time subsequent to the first point in time. At least one of a set of persistent differences and a set of transient differences is determined. The set of persistent differences includes a set intersection of the first and second sets of differences, the set intersection being filtered based on matching non-key values of the differences. The set of transient differences includes a relative complement of the second set of differences in the first set of differences. | 03-19-2015 |
20150088829 | EVENT DRIVEN REMOTE DIRECT MEMORY ACCESS SNAPSHOTS - Mechanisms are provided, in a data processing system, for generating a snapshot of a remote direct memory access (RDMA) resource. The mechanisms receive, from an Input/Output (IO) adapter associated with the data processing system, an error event notification and store, in response to the error event notification, a snapshot of a RDMA resource associated with the error event notification. The mechanisms tear down the RDMA resource in response to the error even notification and free memory associated with the RDMA resource in response to tearing down the RDMA resource. The snapshot stores contents of the RDMA resource. | 03-26-2015 |
20150095285 | SYSTEM AND METHOD FOR PERFORMING AN IMAGE LEVEL SNAPSHOT AND FOR RESTORING PARTIAL VOLUME DATA - The present invention relates to a method for performing an image level copy of an information store. The present invention comprises performing a snapshot of an information store that indexes the contents of the information store, retrieving data associated with the contents of the information store from a file allocation table, copying the contents of the information store to a storage device based on the snapshot, and associating the retrieved data with the copied contents to provide file system information for the copied contents. | 04-02-2015 |
20150106334 | SYSTEMS AND METHODS FOR BACKING UP A LIVE VIRTUAL MACHINE - In many circumstances, it is advantageous to backup the data for a VM while it is in operation. Traditionally, this is accomplished by taking a snapshot of the VM while it is running. After a snapshot has been created, the preserved data is typically referred to as the base disk. The base disk can then be used to create a consistent backup. The hypervisor on which a VM is running can sometimes be used to create a snapshot, but not all virtualization platforms allow access to the base disk after the hypervisor has created the snapshot. The present disclosure features a method for creating a backup for a virtual machine while it is operating through the use of a snapshot and a differencing disk. | 04-16-2015 |
20150106335 | HIERARCHICAL DATA ARCHIVING - Disclosed is a file versioning system and corresponding methods for its operation. The file versioning system allows making snapshots of the file system every time there is a modification to the file system or its items. The snapshots may be linked to their immediate predecessors. Some older snapshots may be discarded according to a “thinning out” process based on multiple criteria. The snapshots may be displayed to a user in a manner making it easy to select a desired version. | 04-16-2015 |
20150106336 | Addressing Cross-Allocated Blocks in a File System - A mechanism is provided for cross-allocated block repair in a mounted file system. A set of cross-allocated blocks are identified from a plurality of blocks within an inode of the mounted file system, based on a corresponding bit associated with each cross-allocated block in a duplicated block information bitmap being in a first identified state. The set of cross-allocated blocks are repaired using a user-defined repair process. Then one or more of the set of cross-allocated blocks are deallocated based on results of the user-defined repair process. | 04-16-2015 |
20150112935 | MANAGING LOG DATA USING A CIRCULAR FIXED SIZE FILE - A request to write new data to a file is received. The file occupies a pre-determined size of storage space in a file-system. A determination is made whether an end location amount of space from an ending location value in an attribute up to the pre-determined size is insufficient to write the new data to the file. A second amount of space is computed. The first and the second amounts of space together are sufficient to write the new data. The second amount of space begins at a starting location value in a starting location attribute. The new data is written using the first and the second amounts of space. The ending location value is changed to indicate a location at the end of new data in the second amount of space. The starting location value is changed to indicate a location where existing data begins after new data. | 04-23-2015 |
20150112936 | BACKUP MANAGEMENT SYSTEM AND METHOD THEREOF - A backup management system includes a backup management device and a number of electronic devices. Each of the electronic devices is in communication with the backup management device and with each other through a network. Each of the electronic devices includes at least one virtual machine. When one of the electronic devices needs to back up the at least one virtual machine, the electronic device sends a backup request to the backup management device. The backup management device instructs the electronic device to back up the at least one virtual machine to one of the other electronic devices. | 04-23-2015 |
20150112937 | ADAPTIVE QUIESCE FOR EFFICIENT CROSS-HOST CONSISTENT CDP CHECKPOINTS - A disaster recovery system, including a target datastore for replicating data written to source datastores, and a checkpoint engine (i) for transmitting, at multiple times, quiesce commands to a plurality of host computers, each quiesce command including a timeout period that is adjusted at each of the multiple times, (ii) for determining, at each of the multiple times, whether acknowledgements indicating that a host has successfully stopped writing enterprise data to the source datastores, have been received from each of the host computers within the timeout period, (iii) for marking, at each of the multiple times, a cross-host checkpoint in the target datastore and reducing the timeout period for the quiesce commands at the next time, if the determining is affirmative, and (iv) for increasing, at each of the multiple times, the timeout period for the quiesce commands transmitted at the next time, if the determining is not affirmative. | 04-23-2015 |
20150112938 | DATA REPLICATION WITH DYNAMIC COMPRESSION - A method for replicating data between two or more network connected data storage devices, the method including dynamically determining whether to compress data prior to transmitting across the network based, at least in part, on bandwidth throughput between the network connected data storage devices. If it has been determined to compress the data, the method involves compressing the data and transmitting the compressed data over the network. If it has been determined not to compress the data, the method involves transmitting the data, uncompressed, over the network. Dynamically determining whether to compress data may include comparing bandwidth measurements with a predetermined policy defining when compression should be utilized. In some embodiments, the policy may define that compression should be utilized when an estimated time for compressing the data and transmitting the compressed data is less than an estimated time for transmitting the data uncompressed. | 04-23-2015 |
20150120665 | OPERATION ARRANGEMENT SUPPORT SYSTEM AND METHOD THEREOF - An operation arrangement work is accelerated by improving efficiency of generating an operation arrangement proposal and confirming whether the operation arrangement proposal is good or not. An operation support system has an operation arrangement proposal generation part ( | 04-30-2015 |
20150127611 | MULTI-TENANCY STORAGE NODE - A multi-tenancy storage node is provided. The storage node hosts partitions of multiple databases accessed by multiple applications. Each database is governed by a corresponding service-level agreement (SLA) or policy that specifies a maximum load or level of operation of the database in terms of one or more metrics (e.g., number or frequency of reads/writes, maximum size of reads/writes). To determine whether another database can be hosted by the node, a snapshot of the node's database operations is replayed on a test node, along with operations that exercise the other database. If maximum thresholds of the node for the metrics are not exceeded, the other database can be added to the storage node. An SLA is generated for it automatically, based on the metrics it exhibited during the operations on the test node. The storage node may enforce the SLA by rate-limiting activity of one or more applications. | 05-07-2015 |
20150134615 | COPYING VOLUMES BETWEEN STORAGE POOLS - Methods, apparatus and computer program products implement embodiments of the present invention that include defining a source data volume including a first multiple of source snapshots, and storing the first multiple of the source snapshots in a first storage pool including a second multiple of storage regions having respective identifiers. Upon receiving a request to copy the source data volume to a target data volume in a second storage pool, a first given source snapshot including a first set of the storage regions is accessed, and a second given source snapshot preceding the first given source snapshot is identified, the second given source snapshot including a second set of the storage regions. A set difference of the second and the first sets of the storage regions is identified, respective identifiers of the set difference are stored to the target volume, and a target snapshot is created for the target volume. | 05-14-2015 |
20150134616 | SNAPSHOTS AND CLONES OF VOLUMES IN A STORAGE SYSTEM - In one embodiment, snapshots and/or clones of storage objects are created and managed by a volume layer of a storage input/output (I/O) stack executing on one or more nodes of a cluster. Illustratively, the snapshots and clones may be represented as independent volumes, and embodied as respective read-only copies (snapshots) and read-write copies (clones) of a parent volume. Volume metadata is illustratively organized as one or more multi-level dense tree metadata structures, wherein each level of the dense tree metadata structure (dense tree) includes volume metadata entries for storing the metadata. Each snapshot/clone may be derived from a dense tree of the parent volume (parent dense tree). Portions of the parent dense tree may be shared with the snapshot/clone. | 05-14-2015 |
20150149411 | COMPARISON OF FILE SYSTEM SNAPSHOTS STORED IN A REMOTE SORAGE SYSTEM USING A NETWORK FILE SYSTEM COMMAND - A method for performing a comparison between first and second points in time snapshots of a file system entity, the method may include: (I) receiving by a storage system a command that was sent from a host computer, the command is network file system protocol compliant, wherein the command comprises (i) an operation code, and (ii) information about a virtual path, the virtual path that comprises (ii.a) first fields that comprise snapshot comparison parameters indicative of the first and second points in time snapshots of the file system entity, and (ii.b) a second field of a content that indicates that the command is a request to compare between the first and second points in time snapshots of the file system entity; (II) identifying, by a file system application hosted by the storage system and in response to the content of the second field of the virtual path, the command as including a request to compare between the first and second points in time snapshots of the file system entity; (III) comparing by the file system application the first and second points in time snapshots of the file system entity to provide a comparison result that is network file system protocol compliant; and (IV) sending by the storage system the comparison result to the host computer. | 05-28-2015 |
20150302020 | MULTI-TENANCY STORAGE NODE - A multi-tenancy storage node is provided. The storage node hosts partitions of multiple databases accessed by multiple applications. Each database is governed by a corresponding service-level agreement (SLA) or policy that specifies a maximum load or level of operation of the database in terms of one or more metrics (e.g., number or frequency of reads/writes, maximum size of reads/writes). To determine whether another database can be hosted by the node, a snapshot of the node's database operations is replayed on a test node, along with operations that exercise the other database. If maximum thresholds of the node for the metrics are not exceeded, the other database can be added to the storage node. An SLA is generated for it automatically, based on the metrics it exhibited during the operations on the test node. The storage node may enforce the SLA by rate-limiting activity of one or more applications. | 10-22-2015 |
20150310080 | MERGING MULTIPLE POINT-IN-TIME COPIES INTO A MERGED POINT-IN-TIME COPY - Provided are a computer program product, system, and method for merging multiple point-in-time copies into a merged point-in-time copy. A repository maintains a full copy of the source data and point-in-time copies at point-in-times of the source data. Each of the point-in-time copies have change information indicating changed data in the source data that changed between the point-in-time of the point-in-time copy and a subsequent point-in-time and changed point-in-time data comprising data in the source data as of the point-in-time of the point-in-time copy indicated in the change information as changed. At least two selected of the point-in-time copies in the repository are merged into a merged point-in-time copy by: forming merged change information in the merged point-in-time copy indicating changed data indicated in change information for the selected point-in-time copies; and forming merged changed data in the merged point-in-time copy from the changed data in the selected point-in-time copies. | 10-29-2015 |
20150347496 | SNAPSHOT MANAGEMENT IN HIERARCHICAL STORAGE INFRASTRUCTURE - Embodiments of the present invention disclose a method, computer program product, and system for snapshot management in a storage infrastructure. A computer accesses a first snapshot captured in a first layer of the storage infrastructure. The computer accesses a second snapshot captured in a second layer of the storage infrastructure. The computer produces a determination that the first snapshot in the first layer of the storage infrastructure is one or more of: inconsistent with the second snapshot in the second layer of the storage infrastructure and a duplicate of the second snapshot in the second layer of the storage infrastructure. The computer removes the first snapshot in the first layer of storage infrastructure responsive to the determination. | 12-03-2015 |
20150378836 | Data Backup Recovery - A mechanism is provided for recovering a data backup comprising a data image and a point-in-time copy of the data image. A virtual data image storage device is provide for storing a copy of the data image, and a virtual snapshot storage device is provided for storing data of the point-in-time copy. The data image is copied to the virtual data image storage device, and data from the point-in-time copy of the data image is copied to the virtual snapshot storage device responsive to the data not existing in the virtual data image storage device. | 12-31-2015 |
20150379029 | PROCESSING A REQUEST IN ACCORDANCE WITH ORIGINAL RULES AND CONFIGURATIONS - System and methods process a received request consistently over extended time by determining the request type and creating metadata with current rules and configuration information for the request type. A system stores the metadata, for instance in a versioning system, and may create a metadata snapshot associated with the request. Through the metadata, the system uses the correct version of rules and configurations to consistently process the request in accordance with the time the request was originally received. | 12-31-2015 |
20160004720 | Object-Level Replication of Cloned Objects in a Data Storage System - Object-level replication of cloned objects from a source file system to a target file system in a data storage system maintains relationships between related objects including shared data blocks so that storage requirements in the target file system match storage requirements of the source file system. Specialized processing may be used to scan an indirection object that refers to other file system objects such that objects requiring replication can be identified on an incremental basis based on checkpoint numbers. Checkpoints in the target file system are managed so that checkpoint number requirements for replicated clone objects are enforced in the target file system. | 01-07-2016 |
20160034481 | EFFICIENT VOLUME-LEVEL REPLICATION OF DATA VIA SNAPSHOTS IN AN INFORMATION MANAGEMENT SYSTEM - The illustrative systems and methods use a special-purpose volume-replicating server(s) to offload client computing devices operating in a production environment. The production environment may remain relatively undisturbed while production data is replicated to a geographically distinct destination. Replication is based in part on hardware-based snapshots generated by a storage array that houses production data. The illustrative volume-replicating server efficiently moves data from snapshots on a source storage array to a destination storage array by transferring only changed blocks for each successive snapshot, i.e., transferring incremental block-level changes. Periodic restore jobs may be executed by destination clients to keep current with their corresponding source production clients. Accordingly, after the source data center goes offline, production data may be speedily restored at the destination data center after experiencing only minimal downtime of production resources. By employing block-level techniques, the disclosed solutions avoid the file-based data management approaches of the prior art, which tend to be too time-consuming and resource-intensive for the present scenario. | 02-04-2016 |
20160034548 | System and Method for Obtaining Automated Scaling of a Virtual Desktop Environment - A virtual desktop system includes a virtualization host, a backup virtualization host, and a virtual desktop manager. The virtual desktop manager routes traffic of the virtual desktop system to the virtualization host, provides a baseline replication of the virtualization host on the backup virtualization host, provides a first snapshot replication of the virtualization host on the backup virtualization host, determines that the virtualization host has experienced a trigger event, synchronizes the virtualization host with the backup virtualization host in response to determining that the virtualization host has experienced a trigger event, and re-routes traffic of the virtual desktop system to the backup virtualization host in response to synchronizing the virtualization host with the backup virtualization host. | 02-04-2016 |
20160070772 | DATA SYNCHRONIZATION IN A CLOUD INFRASTRUCTURE - A synchronization infrastructure that synchronizes data stored between components in a cloud infrastructure system is described. A first component in the cloud infrastructure system may store subscription information related to a subscription order which may in turn be utilized by a second component in the cloud infrastructure system to orchestrate the provisioning of services and resources for the order placed by the customer. The synchronization architecture utilizes transactionally consistent checkpoints that describe the state of the data stored in the components to synchronize the data between these components. | 03-10-2016 |
20160085836 | SYSTEM FOR ACHIEVING NON-INTERRUPTIVE DATA RECONSTRUCTION - A system for achieving non-interruptive data reconstruction is disclosed. The system includes a source storage, a target storage, a server, a traffic modeling unit and at least one data moving service unit. With the help of traffic modeling unit, a period of time of low access can be estimated. Data reconstruction (copying or moving) can be carried on during the period of time. Thus, non-interruptive data reconstruction can be done. | 03-24-2016 |
20160092538 | DYNAMIC DATA COPY UTILITY - Embodiments of the invention relate to systems, methods, and computer program products for a high performance data copy utility that is operable to dynamically copy data from a source database to a target database in an object-relational database environment. High performance is realized by defining, prior to copying the data, performance boundaries of the source and target environment, such as the quantity of data (i.e., commit points) and quantity of parallel processes (i.e., parallel threads) applicable to a copy job. Moreover, the copying schema of the present invention allows for data to be copied from one database to another database without the need higher level privileges, such as database administrator (DBA) or data definition language (DDL), which would otherwise require changing the structure of the database. In this regard, embodiments of the present invention rely solely on lower-level data manipulation language (DML) privileges configured for inserting, updating and deleting data structures. | 03-31-2016 |
20160098413 | APPARATUS AND METHOD FOR PERFORMING SNAPSHOTS OF BLOCK-LEVEL STORAGE DEVICES - An improved apparatus and method for performing snapshots of a logical volume within a block-level storage devices is disclosed. When a snapshot is created, the logical volume manager determines the blocks in the relevant volume that are not allocated and lists those blocks in an exception table. Upon receiving a write request, the volume manager checks the exception table to determine whether the specific block in question is unallocated. If it is allocated, the volume manager performs a copy-on-write for the block for the snapshot. If it is unallocated, the volume manager does not copy the block. This results in significant efficiency, since copy-on-write operations will not be performed for unallocated blocks within a snapshot volume. | 04-07-2016 |
20160103738 | METHODS AND SYSTEMS FOR CONCURRENTLY TAKING SNAPSHOTS OF A PLURALITY OF VIRTUAL MACHINES - Techniques are described herein which minimize the impact of virtual machine snapshots on the performance of virtual machines and hypervisors. In the context of a volume snapshot which may involve (i) taking virtual machine snapshots of all virtual machines associated with the volume, (ii) taking the volume snapshot, and (iii) removing all the virtual machine snapshots, multiple virtual machine snapshots may be created in parallel. In the process of creating virtual machine snapshots, a storage system may determine which snapshots to create in parallel. The storage system may also prioritize snapshots from certain hypervisors in order to avoid the problem of “starvation”, in which busy hypervisors prevent less busy hypervisors from creating snapshots. The techniques described herein, while mainly described in the context of snapshot creation, are readily applied to snapshot removal. | 04-14-2016 |
20160124978 | FAULT TOLERANT DISTRIBUTED JOB SCHEDULER - Methods and systems for managing, storing, and serving data within a virtualized environment are described. In some embodiments, a data management system may manage the extraction and storage of virtual machine snapshots, provide near instantaneous restoration of a virtual machine or one or more files located on the virtual machine, and enable secondary workloads to directly use the data management system as a primary storage target to read or modify past versions of data. The data management system may allow a virtual machine snapshot of a virtual machine stored within the system to be directly mounted to enable substantially instantaneous virtual machine recovery of the virtual machine. | 05-05-2016 |
20160125058 | NETWORK OPTIMIZED DEDUPLICATION OF VIRTUAL MACHINE SNAPSHOTS - Methods and systems for managing, storing, and serving data within a virtualized environment are described. In some embodiments, a data management system may manage the extraction and storage of virtual machine snapshots, provide near instantaneous restoration of a virtual machine or one or more files located on the virtual machine, and enable secondary workloads to directly use the data management system as a primary storage target to read or modify past versions of data. The data management system may allow a virtual machine snapshot of a virtual machine stored within the system to be directly mounted to enable substantially instantaneous virtual machine recovery of the virtual machine. | 05-05-2016 |
20160125059 | HYBRID CLOUD DATA MANAGEMENT SYSTEM - Methods and systems for managing, storing, and serving data within a virtualized environment are described. In some embodiments, a data management system may manage the extraction and storage of virtual machine snapshots, provide near instantaneous restoration of a virtual machine or one or more files located on the virtual machine, and enable secondary workloads to directly use the data management system as a primary storage target to read or modify past versions of data. The data management system may allow a virtual machine snapshot of a virtual machine stored within the system to be directly mounted to enable substantially instantaneous virtual machine recovery of the virtual machine. | 05-05-2016 |
20160140134 | CDBMS (CLOUD DATABASE MANAGEMENT SYSTEM) DISTRIBUTED LOGICAL UNIT REPOSITORY - The invention comprises systems and methods for implementation of database technology using ‘Distributed logical unit repositories’ (DLUR). This is a new type of database which contains information and database structure related to a specific logical unit such as a customer, employee or the like. The information comprises data, database structure, functions, and any other data necessary to form a complete model of the information concerning the logical unit. Queries concerning entities can then be answered immediately by accessing this database, obviating the step of consulting a number of databases in parallel and greatly reducing memory and time required. | 05-19-2016 |
20160142483 | UNIFIED SNAPSHOT STORAGE MANAGEMENT, USING AN ENHANCED STORAGE MANAGER AND ENHANCED MEDIA AGENTS - An illustrative approach to managing snapshots streamlines how and when snapshots are generated in a storage management system, such that fewer snapshots may be generated without diminishing the scope of data protection. A novel unified-snapshot storage policy may govern snapshots for any number of subclients. A unified-snapshot job based on the unified-snapshot storage policy enables the illustrative storage management system to automatically discover relevant components and generate at most one snapshot per target logical unit number (“LUN”) in a storage array. Each snapshot may comprise the data of any number of subclients and/or clients in the storage management system. Accordingly, one unified-snapshot job may yield a minimum but sufficient number of snapshots comprising data of all subclients associated with the governing unified-snapshot storage policy. An enhanced storage manager may manage the unified-snapshot jobs. One or more enhanced media agents and/or data agents may participate in the unified-snapshot jobs and in subsequent cataloguing of the snapshots. | 05-19-2016 |
20160154706 | FLASH COPY FOR DISASTER RECOVERY (DR) TESTING | 06-02-2016 |
20160162509 | System and Method for Managing Deduplication Using Checkpoints in a File Storage System - A deduplication system and method involves interaction between a software-based system that manages the overall background deduplication process and a hardware-based system that includes a hardware-based filesystem manager and a hash generator. A filesystem checkpoint mechanism is leveraged to manage the background deduplication process and also to reduce processing complexity with respect to identifying chunks that are candidates for deduplication and processing such chunks. | 06-09-2016 |
20160170837 | USE OF REPLICATED COPIES TO IMPROVE DATABASE BACKUP PERFORMANCE | 06-16-2016 |
20160179839 | METHODS AND APPARATUS FOR CONTROLLING SNAPSHOT EXPORTS | 06-23-2016 |
20160188691 | RECOVERY SYNCHRONIZATION IN A DISTRIBUTED STORAGE SYSTEM - A method for data storage includes sending write commands to a first storage node, for storing data in a data volume on the first storage node. In response to a decision to create a copy of the data volume on a second storage node, (i) the write commands are sent both to the first storage node and to the second storage node, and (ii) a snapshot of the data volume is created and sent from the first storage node to the second storage node. The copy of the data volume is created by the second storage node based on the snapshot and on one or more of the write commands received at the second storage node. | 06-30-2016 |
20160196088 | SYSTEM AND METHOD FOR MANAGING STORAGE SYSTEM SNAPSHOTS | 07-07-2016 |
20170235745 | DATABASE MAINTENANCE USING BACKUP AND RESTORE TECHNOLOGY | 08-17-2017 |
20190146947 | METHODS AND APPARATUS FOR EFFICIENT CONTAINER LOCATION DATABASE SNAPSHOT OPERATION | 05-16-2019 |
20190146948 | OPERATION READINESS CHECKING AND REPORTING | 05-16-2019 |